Deck 4: IT and Computer Systems

Full screen (f)
exit full mode
Question
Which will not harm computer resources

A)firewall
B)virus
C)trojan horse
D)none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Which is not a function of ERP?

A)warehousing
B)sales
C)scheduling
D)none of the above
Question
Which is a function of ERP?

A)warehousing
B)sales
C)scheduling
D)all of the above
Question
Which of the following is the primary characteristic of an intranet?

A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
Question
Which concept suggests that different applications and computer systems should be able to communicate with one another?

A)integration
B)web services
C)scalability
D)interoperability
Question
Which service encompasses all technologies used to transmit and process information on an across a network?

A)interoperability
B)scalability
C)benchmarking
D)web services
Question
Which process can prevent data from lose due to computer problems or human errors?

A)backup
B)recovery
C)benchmarking
D)data cleansing
Question
Which process is used to reinstall data from a copy when the original data has been lost?

A)backup
B)recovery
C)benchmarking
D)data cleansing
Question
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A)performance
B)capacity planning
C)benchmarking
D)data cleansing
Question
Who protects system from external threats?

A)firewall
B)edi
C)erp
D)script kiddies
Question
What is software that comes hidden in free downloadable software and tracks your onlinemovements, mines the information stored on your computer, or uses your computer's CPU andstorage for some task you know nothing about?

A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
Question
Which is not a component of ERP?

A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
Question
Which is not a function of ERP?

A)human resource management
B)financial
C)warehousing
D)none of the above
Question
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
Question
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A)risk management
B)risk assessment
C)security
D)none of the above
Question
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A)risk management
B)risk assessment
C)security
D)none of the above
Question
What is the process of making a copy of the information stored on a computer?

A)backup
B)anti-virus
C)firewall
D)biometrics
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: IT and Computer Systems
1
Which will not harm computer resources

A)firewall
B)virus
C)trojan horse
D)none of the above
firewall
2
Which is not a function of ERP?

A)warehousing
B)sales
C)scheduling
D)none of the above
none of the above
3
Which is a function of ERP?

A)warehousing
B)sales
C)scheduling
D)all of the above
all of the above
4
Which of the following is the primary characteristic of an intranet?

A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
Which concept suggests that different applications and computer systems should be able to communicate with one another?

A)integration
B)web services
C)scalability
D)interoperability
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
Which service encompasses all technologies used to transmit and process information on an across a network?

A)interoperability
B)scalability
C)benchmarking
D)web services
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
Which process can prevent data from lose due to computer problems or human errors?

A)backup
B)recovery
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
Which process is used to reinstall data from a copy when the original data has been lost?

A)backup
B)recovery
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A)performance
B)capacity planning
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
Who protects system from external threats?

A)firewall
B)edi
C)erp
D)script kiddies
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
What is software that comes hidden in free downloadable software and tracks your onlinemovements, mines the information stored on your computer, or uses your computer's CPU andstorage for some task you know nothing about?

A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Which is not a component of ERP?

A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
Which is not a function of ERP?

A)human resource management
B)financial
C)warehousing
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A)risk management
B)risk assessment
C)security
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A)risk management
B)risk assessment
C)security
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
What is the process of making a copy of the information stored on a computer?

A)backup
B)anti-virus
C)firewall
D)biometrics
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 17 flashcards in this deck.