Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Contemporary Business Study Set 2
Quiz 14: Using Technology to Manage Information
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Which of the following disasters does NOT make information systems vulnerable?
Question 102
Multiple Choice
Complete the following using the terms listed below. -A(n) ______ is a computer program that imitates human thinking through complicated sets of "if/then" rules.
Question 103
Multiple Choice
Complete the following using the terms listed below. -A centralized integrated collection of data resources is known as a(n) ______.
Question 104
Multiple Choice
______ is used for planning and preventing computer system failures, and planning how to continue operations if computer systems do fail.
Question 105
Multiple Choice
Complete the following using the terms listed below. -A system that allows top managers to access a firm's primary databases is called a(n) ______.
Question 106
Multiple Choice
Complete the following using the terms listed below. -______ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
Question 107
Multiple Choice
An outside supplier used to provide computer and application support for managing an information system is known as ______.
Question 108
Multiple Choice
Complete the following using the terms listed below. -A secure connection between two points on the Internet is known as a(n) ______.
Question 109
Multiple Choice
______ refers to the use of powerful servers that store application software and databases. Users can access stored information by using any Internet-connected device, such as a PC or a smartphone.
Question 110
Multiple Choice
Complete the following using the terms listed below. -The purpose of a(n) ______ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.