Filters
Question type

Study Flashcards

The success of data mining depends on access to data.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is a semiprivate network that uses Internet technology to enable more than one company to access the same information or to allow people on different servers to collaborate.


A) crossnet
B) extranet
C) outernet
D) alternet

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.

A) True
B) False

Correct Answer

verifed

verified

Gary has been using Dropbox. The cloud he is storing his information to is called a


A) private cloud.
B) public cloud.
C) hybrid cloud.
D) analytical cloud.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An intranet is a companywide network that is based on Internet-type technology, but closed to public access.

A) True
B) False

Correct Answer

verifed

verified

The main purpose of an intranet is to allow a company to keep in close contact with its customers.

A) True
B) False

Correct Answer

verifed

verified

In the area of electronic communications, the main focus of corporate and government security officials today is the prevention of credit card fraud.

A) True
B) False

Correct Answer

verifed

verified

Beginning with the late 1980s the goal of information technology was to


A) improve the flow of financial information throughout business organizations.
B) use new technologies to offer new methods of conducting business.
C) prevent proprietary information from falling into the hands of competitors.
D) use new technologies to improve old methods.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.

A) True
B) False

Correct Answer

verifed

verified

________ is a process that allows software-based networked computers to run multiple operating systems and programs, and share storage.


A) Public domain softwaring
B) Groupwaring
C) Virtual networking
D) Cloud computing

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.

A) True
B) False

Correct Answer

verifed

verified

Mini-Case Cy Burspace first began working for Epic Electronics in the mid-1970s as a business technology specialist. Today, he is the department head for the company's information systems department. Cy is well known and respected by everyone in the company, and his coworkers recently threw a party to honor his 30th year with Epic. Cy did a lot of reminiscing at the party, telling the newer employees how things were done in the "old days," and comparing them to newer methods. "I'm still amazed at how things have changed. When I first came to Epic, we had a central computer to handle everything. It took up a whole room, but all it really did was generate financial reports for management," said Cy. "Today, employees have their own personal computer, and all are hooked up to a network. All of this connectivity has led to big improvements in our operations. For example, if a production worker wants to find out how many units of a particular component we have in inventory, or wants the name and address of a particular supplier who sells us that component, he or she can get the information in the blink of an eye. In fact, we have even given our suppliers and customers access to our network so that we can share information and provide them with better service. That change has really helped us compete against the bigger firms." "Now," Cy continued, "most of the workers in my department don't even have to be at the office to be connected. We have smartphones and laptops so we can do much of our work from home or while we are on the road." A new employee asked Cy if he was ready to retire. "No way," he said. "I'm in the middle of a major project right now. We're trying to design a single entry point for people to use when logging on to the Epic network. We want to set it up so that the log-on procedure identifies different types of users and automatically gives them access to the types of resources they need. For example, customers who logged on would be allowed to place orders, check on the status of previous orders, and interact with our technical support staff, but would not have access to other, more proprietary parts of our network. We think this approach will be more convenient for everyone. And," he continued, "once I finish that project, the marketing department has asked me to work on developing better ways to store and analyze the vast amounts of data we collect. So my work is cut out for me for quite a while yet." -People in marketing want Cy's help because they are convinced that many hidden patterns and unexpected relationships could be found in the mountains of data the company accumulates. They think that discovering these relationships might help them develop new marketing strategies. This suggests that Cy's next project will be concerned with


A) datametric analysis.
B) data mining.
C) data refining.
D) data orienteering.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

NASDAQ is an example of how information technology can


A) help engineers design products that exactly meet the needs of a specific target market.
B) be used to create organizations and provide services that are independent of location.
C) provide small firms with new opportunities to grow by forming alliances with larger companies.
D) help the government measure the environmental impact of business activities.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.


A) Information processing
B) Data processing
C) Artificial intelligence
D) Business intelligence

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

In the 1970s business technology was known as data processing.

A) True
B) False

Correct Answer

verifed

verified

The increasing use of computer networks has made computer security more complicated.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the best assessment of the impact extranets have had on the way small businesses operate?


A) As yet, extranet technology has had little impact on small businesses, because the technology is too new and expensive.
B) The development of extranets has put small firms at a serious competitive disadvantage, because suppliers and customers are more willing to participate in extranets set up by larger organizations.
C) The use of extranets enables small firms to share and process data in ways that had been available in the past only to large firms that could afford electronic data interchange technology.
D) The extranet has made it easier for small firms to offer their goods and services to the general public because of the increased bandwidth this technology provides.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Melissa, a new employee at Epic Electronics, is required to perform a variety of bookkeeping and clerical tasks at a workstation. Epic has training software on its workstations that can answer many of the questions she has about what to do on her new job, and how to do it. The software is so good that she rarely asks her supervisor for help. It even tracks the way Melissa performs certain tasks, and offers suggestions to improve her productivity. This software is an example of


A) the use of a technique called computer aided production (CAP) that is becoming increasingly important in high-tech industries.
B) the trend toward telecommuting.
C) the way businesses are using knowledge technology to move relevant information to the people who need it.
D) why mainframe computer systems are more efficient than network computer systems.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Compared to the Internet, a major advantage of Internet2 is that it


A) can be accessed even by people without computers; all that is needed is a simple, inexpensive receiver, a television set, and a standard telephone line.
B) is owned and operated by the United Nations, and is accessible to people in every nation.
C) can move information much faster than the Internet and has the capacity to handle heavy-duty applications.
D) allows firms to set up their own protocols for transferring and processing information.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 192

Related Exams

Show Answer