Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 13          USING TECHNOLOGY TO MANAGE INFORMATION     TRUE-FALSE QUESTIONS   1)

Chapter 13          USING TECHNOLOGY TO MANAGE INFORMATION     TRUE-FALSE QUESTIONS   1)

Business

Chapter 13          USING TECHNOLOGY TO MANAGE INFORMATION

 

 

TRUE-FALSE QUESTIONS

 

1). An alphabetic listing of the names and GPAs of everyone in your class is an example of data.

a. True

b. False

 

2. A local area network (LAN) connects computers at one site and enables their users to exchange data and share hardware and software from a variety of computer manufacturers.

a. True

b. False

 

3. The Internet is essentially a worldwide wide area network (WAN).

a. True

b. False

 

4. Intranets, VPNS, and extranets are forms of LANs.

a. True

b. False

 

5. Like local area networks (LANs), intranets are private corporate networks.

a. True

b. False

 

6. An enterprise portal is an internal Web site that provides proprietary corporate information to a defined user group.

a. True

b. False

 

7. Virtual private networks can be used to connect two or more LANS.

a. True

b. False

 

8. ASPs, which are also called area server portals, provide computer users with access to e-commerce opportunities.

a. True

b. False

 

9. When a bank collects deposits during the day, then deposits them all after banking hours, it is using a reserve processing system.

a. True

b. False

 

10. An accounts clerk who is able to record a payment of 50 dollars into the company's main computer system as the payment is made is using an online processing system.

a. True

b. False

 

11. Data marts are special subsets of a data warehouse that deals with a single area of data, which are organized for quick analysis

a. True

b. False

 

12. At the first level of a management support system is an information-reporting system.

a. True

b. False

 

13. The primary use for an expert system is to answer “what if” questions.

a. True

b. False

 

14. Today’s companies are spending increasing amounts of money on IT and reaping the benefits of this investment.

a. True

b. False

 

15. Knowledge management is much easier than information management.

a. True

b. False

 

16. Software piracy relates to transferring programs and information from hard disks to floppy disks.

a. True

b. False

 

17. Networking links make it easier for someone outside an organization to gain access to a computer’s information.

a. True

b. False

 

18. A computer program that copies itself into other software and can spread to other computer systems is called a software infestation.

a. True

b. False

 

19. Data tracking is a sophisticated data application that looks for hidden patterns in a group of data to help predict future behavior.

a. True

b. False

 

20. Grid computing is another term used for telecommuting.

a. True

b. False

 

 

21. One of the trends in information technology is digital forensics.

a. True

b. False

 

22. The shift to virtual workers has been a disappointing trend that is gradually vanishing.

a. True

b. False

 

 

MULTIPLE-CHOICE QUESTIONS

 

1. _____ refers to all of the equipment and techniques needed to manage and process information.

A. A data processing system

B. A transaction system

C. Information technology

D. A relational network

E. An intranet

 

2. _____ contribute to and benefit from information that use in performing, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions. 

A. Knowledge workers

B. Knowledge shareholders

C. Information technicians

D. Information monitors

E. Transactional processors

 

3. It is paramount for a dentist to provide the best patient care possible.  The dental assistant, even though he or she may perform unskilled work such as fitting a patient with a bib, must also know the proper use of surgical and sterilization techniques to ensure patient safety. Formally educated dental assistants have the knowledge to understand the difference between sterilization and disinfection, and the relative importance of both. Since such are nearly always performed by dental assistants, a dental assistant can be correctly identified as a:

A. knowledge workers

B. knowledge shareholders

C. information technicians

D. information monitors

E. transactional processors

 

4. Customer records containing names, addresses, phone numbers, and purchase histories would be most likely stored in:

A. customer relational networks

B. database management systems

C. spreadsheets

D. information processing networks

E. transactional networks

 

5. Cerner Corporation has created a(n) _____ containing the medical records of more than 400,000 people who received treatment at more than 200 different emergency rooms.  It can be used to help emergency room physicians make decisions about what kind of treatment to give their patients.

A. customer relational network

B. database

C. spreadsheet

D. information processing network

E. transactional network

 

 

6. The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest range of convicted criminals permitted under current law. This will result in the collection of as many as 40,000 DNA profiles.  The additional DNA profiles may be obtained as a condition of release on parole or probation, as a condition of participation in the Department of Correctional Services' temporary release programs, and as a condition of a plea bargain.  This _____ will be used for solving crimes. 

A. criminal relational network

B. database

C. spreadsheet

D. information processing network

E. transactional network

 

7. The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest range of convicted criminals permitted under current law. This will result in the collection of as many as 40,000 DNA profiles.  The additional DNA profiles may be obtained as a condition of release on parole or probation, as a condition of participation in the Department of Correctional Services' temporary release programs, and as a condition of a plea bargain.  A(n) _____ will be used to store, maintain, and acquire data from these records.

A. relational network

B. database management system

C. spreadsheet

D. information processing network

E. transactional network

 

8. A group of two or more computer systems linked together by communications channels to share data and information is called a computer:

A. database

B. network

C. mainframe

D. combination

E. conglomerate

 

9. The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest range of convicted criminals permitted under current law. This will result in the collection of as many as 40,000 DNA profiles.  The additional DNA profiles may be obtained as a condition of release on parole or probation, as a condition of participation in the Department of Correctional Services' temporary release programs, and as a condition of a plea bargain.  A computer _____ would allow investigating officers from other states to access the New York profiles and to provide information about their state's criminals to New York's law officers.

A. database

B. network

C. mainframe

D. combination

E. conglomerate

 

10. Which of the following statements about computer networks is true?

A. A computer network is a group of two or more computers linked together by communications channels to share data and information.

B. A LAN is a logistical analog network.

C. Computer networks can only be used to connect computers at one site.

D. Enterprise software cannot be run on computer networks

E. Today’s networks only have the capability to link 20 or fewer computers together.

 

11. Which of the following statements about computer networks is true?

A. Computer networks include clients and servers.

B. Within a computer network, the server is the application that runs on a personal computer or workstation.

C. Within a computer network, the client manages the network’s resources.

D. Networks have eliminated the need for data sharing.

E. All of the above statements about computer networks are true.

 

12. A(n) _____ is the collective term that describes the methods and the equipment used to provide information about all aspects of a firm’s operation.

A. information processing system

B. information network

C. management information system

D. transaction processing system

E. customer relational network

 

13. A LAN is a:

A. word processing software system

B. type of modem

C. network of computer systems that share the use of software and hardware

D. graphic design system

E. processing control unit

 

14. At Samaritan Medical Center (SMC) in Watertown, N.Y., care providers needed to continuously monitor patients' vital signs as staff moved them from the emergency department to radiology and other hospital areas.  The hospital administrators decided to use a(n) _____, a cost-effective way to connect the monitoring devices and to prioritize the critical data that the devices were gathering.  A nurse sitting at a terminal knows immediately if there is a problem.

A. administrative portal

B. extranet

C. public network

D. local area network

E. linking network

 

15. _____ offer companies a more cost-effective way to link computers than linking terminals to a mainframe computer.

A. Intranets

B. Extranets

C. Virtual private networks

D. Local area networks

E. Linking networks

 

16. A network that connects computers at different sites via telecommunications media is called a(n):

A. local area network

B. Web-based network

C. long-distance communications system

D. wide area network

E. in-house communications computer system

 

17. A network that connects computers at one site is called a(n):

A. local area network

B. Web-based network

C. long-distance communications system

D. wide area network

E. in-house communications computer system

 

18. _____ are examples of wide area networks (WANs).

A. Functional and process networks

B. Hierarchical and matrix networks

C. Functional and hierarchical networks

D. Extranets and intranets

E. Personal and nonpersonal networks

 

19. When compared to a wired LAN, the wireless LAN is:

A. unable to transmit data at one single site

B. faster and more reliable

C. is unable to communicate with wired communication systems

D significantly more expensive

E. typically inconvenient to use

 

20. _____ are internal corporate wide area networks that use Internet technology to link employees in many different locations and with many different types of computers.

A. Intranets

B. Functional networks

C. Specialized networks

D. Extranets

E. Information systems

 

21. NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world.  When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc.  NMCI is an example of a(n):

A. intranet

B. functional network

C. specialized network

D. extranet

E. information system

 

22. General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees.  Another name for this network that operates behind a firewall is a(n):

A. intranet

B. functional network

C. specialized network

D. extranet

E. information system

 

23. Intranets are essentially mini-Internets that operate behind a(n) _____ that prevents unauthorized access.

A. network barrier

B. communications buffer

C. insulated connector

D. modem synthesizer

E. firewall

 

24. Many companies use _____ to connect two or more private networks over a public network, such as the Internet.

A. multinets

B. extranets

C. virtual private networks

D. wireless local networks

E. connects

 

25. Virtual private networks (VPNs):

A. require a significant investment in Internet infrastructure in order to operate efficiently

B. connect two or more private networks using a public network

C. can dramatically increase a company’s communications cost

D. are least useful to people who regularly work outside of the office

E. are accurately described by none of the above

 

26. To keep pace with changing technology, officers of the Honolulu Police Department (HPD) needed a better means to perform such tasks as running a license plate number while simultaneously sending back field reports to precinct headquarters.  Through the use of a _____, officers were able to use the Internet to connect with the information stored in state databases and to connect with their superiors. 

A. interconnects

B. extranets

C. virtual private networks

D. wireless local networks

E. connects

 

27. One of the important decisions managers have to make is whether to buy and commit to upgrading its computer equipment every couple of years.  One way of avoiding having to buy costly upgrades, which can quickly become obsolete, is to use:

A. a software infrastructure

B. Web sharing

C. an Internet warehouse

D. application service providers

E. software piracy

 

28. A(n) _____ is a service company that buys and maintains software on its servers and distributes it through high-speed networks to subscribers for a set period of time and a predetermined price.

A. batch processor

B. application service provider

C. extranet

D. intranet

E. service warehouse

 

29. Any Houston, Texas, resident, armed with a free Houston Public Library PowerCard, can tap into a suite of office applications to write a resume, maintain a personal calendar, or keep records for a business. The city signed a contract with Internet Access Technologies (IAT) in June 2002 to provide these services.  IAT is more than likely an example of a(n):

A. batch processor

B. application service provider

C. extranet

D. intranet

E. service warehouse

 

30. The three major categories of applications supplied by application service providers are:

A. office automation systems, expert systems, and decision support systems

B. transaction processing systems, enterprise applications, and predictive applications

C. enterprise applications, predictive applications, and decision support systems

D. predictive applications, expert systems, and security applications

E. enterprise applications, collaborative applications, and applications for personal use

 

31. A(n) _____ is an internal Web site that provides proprietary corporate information to a defined user group.

A. work station

B. internal network

C. virtual network

D. enterprise portal

E. knowledge manager

 

32. Maysteel, which makes components for electric utilities, has created a(n) _____ that allows its six plant managers in Wisconsin and Ireland to access customized information about the costs and sales at the other plants.  The only people who can access this information are its managers.

A. work station

B. internal network

C. virtual network

D. enterprise portal

E. knowledge manager

 

33. Enterprise portals can take one of three forms.  They are:

A. business-to-business, consumer-to-consumer, and consumer-to-business

B. B2B, B2E, and B2C

C. C2C, B2B, and C2B

D. virtual, wired, and wireless

E. intranet, extranet, and WWAN

 

34. Companies are adopting enterprise portals because the portals:

A. perform tasks and processes more quickly than other methods

B. provide cost savings through the elimination of “information intermediaries”

C. improve communications with customers, suppliers, dealers, and distributors

D. can be used to integrate disparate systems and multiple sets of information

E. do all of the above

 

35. Through the use of a(n) _____ physicians with patients at many hospitals can access and interact with multiple, disparate hospital information systems through a single, secure, Web-based application. Data that is accessible may include demographics, lab results, radiological images or other diagnostic data. In addition, physicians can use the technology to view patients' aggregated clinical data, electronically sign orders, and order medications and lab tests in both ambulatory and inpatient settings.

A. work station

B. internal network

C. virtual network

D. enterprise portal

E. knowledge manager

 

36. Which type of information system is used only by operational managers?

A. management analytic system

B. transaction processing system

C. word processing system

D. executive information system

E. office automation system

 

37. Which type of information systems is used by both operational managers and middle managers?

A. information reporting system

B. transaction processing system

C. management analytic system

D. decision support system

E. expert system

 

38. In a transaction processing system the database can be updated in two ways.  They are _____ processing.

A. batch and on-line

B. open and closed

C. batch and database

D. open and auxiliary

E. on-line and periodic

 

39. Collecting data over a period of time and then processing that data all at the same time is called _____ processing.

A. off-line

B. on-line

C. auxiliary

D. batch

E. group

 

40. Processing data as they become available is called _____ processing.

A. off-line

B. online

C. auxiliary

D. batch

E. coordinated

 

41. Australia’s Health Insurance Commission processes 300 million health claims and makes annual payments of $8 billion of payments to clients.  The company would store all of its more than three gigabytes of information in a(n) _____ to support management decision making.

A. data mine

B. information center

C. data station

D. data warehouse

E. information network

 

42. In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic.  Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited.  All of the customer information gathered was stored in a(n):

A. data mine

B. information center

C. data station

D. data warehouse

E. information network

 

43. A(n) _____ is an organization’s management support system that combines many databases to improve management decision making.

A. data mine

B. information center

C. data station

D. data warehouse

E. information network

 

44. Data warehouses may contain many _____, subsets of a data warehouse that each deal with a single area of data.

A. data marts

B. information networks

C. data mines

D. information clusters

E. data nuggets

 

45. The United States Army retains a history of all equipment acquisition from approval of requirements through funding, authorizing, fielding, and maintenance to equipment retirement.  This data would be kept in a(n):

A. data mart

B. information network

C. data mine

D. information cluster

E. data nugget

 

46. Victoria Secret maintains a large data warehouse in which it keeps track of inventory, buying patterns, and regional differences.  An examination of information from a data warehouse subset that contained data from its Miami, Florida, stores showed that for every one black bra purchased ten ivory bras were purchased.  This subset is referred to as a(n):

A. data mart

B. information network

C. data mine

D. information cluster

E. data nugget

 

47. A system that collects and stores the company's key data and produces the information needed by managers for analysis, control, and decision making is called a(n):

A. office automation system

B. management support system

C. batch operations

D. process control unit

E. decision processing unit

 

48. At the first level of a management support system is a(n) _____ system, which uses summary data collected by the transaction processing system to provide managers with decision-making information.

A. executive information

B. operating

C. information reporting

D. expert

E. office automation

 

49. If a manager needs a reporting system that provides the ability to ask "what if" questions, he or she would probably install a(n) _____ system.

A. decision support

B. transaction processing

C. operating

D. expert

E. information reporting

 

50. Ground water is a vital water resource in the Choushui River area of Taiwan. A significantly increased demand for water, resulting from rapid economic development, has led to large scale ground water extraction. Overdraft of ground water has considerably lowered the ground water level, and caused seawater intrusion, land subsidence, and other environmental damage. Sound ground water management thus is essential.  Chinese government officials have set up a(n) _____ system that allows it to make water management decisions using interactive computer models based on real-world processes.

A. decision support

B. transaction processing

C. operating

D. batch

E. information reporting

 

51. A retail manager who wants to know how his store’s sales would be affected if he reduces the number of different national brands the store carries would use what type of information system?

A. transaction processing system

B. decision support system

C. information reporting system

D. expert system

E. office automation system

 

52. Cerner Corporation has created a(n) ______ that helps emergency room physicians make decisions about what kind of treatment to give their patients.  The system contains the medical records of more than 400,000 people who received treatment at more than 200 different emergency rooms.  By comparing inputted information about a patient with information stored in the system, doctors can get a diagnosis and suggestions as to possible treatments.

A. transaction processing system

B. decision support system

C. information reporting system

D. expert system

E. office automation system

 

53. How does an executive information system (EIS) differ from a decision support system (DSS)?

A. An EIS answers “what-if” questions; a DSS does not.

B. All EIS are provided by application service providers, and DSS are typically purchased.

C. EIS is customized for an individual executive, and DSS is not.

D. An DSS answers “what-if” questions; an EIS does not.

E. An EIS is a communication system while a DSS is a transaction system.

 

54. A(n) _____ is a management support system that is customized for an individual executive.  It provides specific information for strategic decision making.

A. decision support system

B. expert system

C. information automated system

D. executive information system

E. management database system

 

55. A(n) _____ system is a management support system that uses artificial intelligent to enable computers to reason and learn to solve problems in much the same way as humans do.

A. executive information

B. operating

C. information reporting

D. expert

E. decision support

 

56. An expert system:

A. uses artificial intelligence

B. provides managers with advice similar to what they would get from a human consultant

C. is expensive and difficult to create

D. is a type of management support system

E. is accurately described by all of the above

 

57. Academic advisement is unevenly provided in many high schools and colleges. There is a plan to provide advice to high school students and to college freshmen that are seeking a potential major. The on-demand consultation gathers information about a student's grades, interests, test scores, interests and aptitudes. It assesses student qualifications for a variety of majors. The _____ will then recommend six majors for them to consider and provides further information sources about the major.

A. collateral information

B. operating

C. information reporting

D. expert

E. decision support

 

58. A(n) _____ is an information system that uses information technology tools to improve communications throughout an organization.

A. office automation system

B. information reporting system

C. expert system

D. data channel

E. transaction communications system

 

59. Office automation decisions are specifically designed to:

A. replace costly experts

B. analyze databases

C. improve organizational communications

D. maintain organizational culture

E. make decisions with a higher degree of certainty

 

60. Which of the following statements about knowledge management is true?

A. Knowledge management is the same as information management.

B. Knowledge management involves collecting, processing, and condensing information.

C. Knowledge management is more easily accomplished than information management.

D. While companies have the ability to manage knowledge, most cannot manage information.

E. None of the above statements about knowledge management is true.

 

61. _____ management focuses on gathering and sharing an organization’s collective knowledge to improve productivity and foster innovation.

A. Knowledge

B. Entrepreneurial

C. Creative

D. Information

E. Productivity

 

62. By helping to eliminate critical errors and allowing nonprofits to stay focused on their primary missions of improving communities throughout California, nonprofit information specialists play a critical role and have a significant impact on work in the nonprofit sector. The nonprofit information specialist is frequently the first resource that board members, staff, and volunteers of nonprofit organizations, as well as the general public, contact to find answers to their questions. Trained NIS (nonprofit information services) staff must understand nonprofit culture and terminology and know the experts in a field to be able to give questioners appropriate information, community resources, Web sites, or consultant referrals.  NIS staff use _____ to improve productivity and foster innovation.

A. intranet control

B. extranet capabilities

C. knowledge management

D. data mining

E. information screening

 

 

63. Which of the following statements about knowledge management is true?

A. Knowledge management eliminates security breaches and unauthorized access to a company’s knowledge.

B. Knowledge management focuses on gathering and sharing an organization’s collective knowledge to improve productivity and foster innovation.

C. Knowledge management is so complex that it does not belong in any one functional area.

D. Knowledge management is synonymous with information management.

E. All of the above statements about knowledge management are true.

 

64. A good technology plan provides employees with the tools they need to perform their jobs at the highest levels of efficiency.  The first step in developing a good technology plan is:

A. a situational analysis

B. budgeting

C. the establishment of rules and regulations

D. brainstorming

E. a general needs assessment

 

65. Which of the following is NOT an example of a basic question that departmental managers and IT specialists should ask when planning technology purchases?

A. Can current employees learn to use new technology?

B. What are the company’s overall objectives?

C. What are the company’s priorities, both short-term and long-term?

D. How can technology help the company solve its problems?

E. Which technology meets the company’s requirements?

 

66. Which of the following is an example of a data security issue?

A. unauthorized access

B. chat rooms

C. sexual innuendoes expressed through lewd humor

D. biometrics

E. all of the above

 

67. In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic.  Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited.  At issue was which data security issue?

A. unauthorized access

B. chat rooms

C. sexual innuendoes expressed through lewd humor

D. biometrics

E. consumer privacy

 

68. Which of the following is an example of a data security issue?

A. software piracy

B. unauthorized access and use

C. deliberate damage

D. introduction of a computer virus

E. all of the above

 

69. By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

A. unfair access

B. software shrinkage

C. software piracy

D. technological turnover

E. hardware sabotage

 

70. Symantec Corp. has been granted a judgment totaling $3 million in a suit against a Maryland software firm accused of selling counterfeit copies of Symantec software, including Norton SystemWorks and Norton Antivirus.  Symantec d won a legal judgment against the Maryland firm for:

A. unfair access

B. software shrinkage

C. software piracy

D. technological turnover

E. hardware sabotage

 

71. Copying of software programs by people who haven't paid for them is called:

A. unfair access

B. software shrinkage

C. software piracy

D. technological turnover

E. hardware sabotage

 

72. A computer program that copies itself into other software and can spread to other computer systems is called:

A. computer guerrilla activity

B. a computer vindication

C. a software infestation

D. a computer virus

E. a computer breach

 

73. Which of the following statements about computer viruses is true?

A. Another name for computer viruses is worms.

B. There is no way to protect against computer viruses

C. Viruses copy themselves onto other software.

D. Viruses cannot hide on your computer

E. Spam is unrelated to viruses.

 

74. How does unsolicited and unwanted e-mail pose a security risk to companies?

A. Viruses spread through e-mail attachments.

B. Hackers enter systems through e-mail.

C. Firewalls can be breached by e-mails.

D. E-mail increases worker productivity.

E. Each e-mail requires a reply.

 

75. According to the text, the three IT trends that are having the greatest impact on the IT environment are:

A. privacy management, virus suppression, and enterprise portals

B. grid computing, on-demand computing, and real-time computing

C. digital forensics, the distributed workforce, and grid computing

D. knowledge management, privacy management, and intranets

E. privacy management, enterprise warehouses, and knowledge management

 

76. The idea behind _____ is the need that criminal investigators have for examining evidence on computer hard drives such as in e-mails or databases in order to build cases against embezzlers and others.

A. a cyber strike force

B. data mining

C. digital forensics

D. data combing

E. data sleuthing

 

77. John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant.  He works with hard drives and various other types of computer equipment strewn across several desks. Sgromolo, spends his days culling together bits and pieces of data people think they have erased from existence months, even years, before. His findings have been used in cyber-crime cases and murder investigations.  Sgromolo engages in:

A. data mirroring

B. data mining

C. digital forensics

D. data combing

E. data sleuthing

 

78. A company that needs access to high-end computing resources periodically but has little money to spend on such a project can use:

A. grid computing

B. virtual application providers

C. network servers

D. expert systems

E. executive decision systems

 

79. _____ allows people with PCs or other types of machines connected to the Internet to donate processor cycles to the search for extraterrestrial life. This process involves sifting through the static of deep space on billions of radio channels looking for stray signals that are generated by alien civilizations.

A. Grid computing

B. Virtual application system

C. Network server system

D. An expert system

E. An executive decision system

 

80. The idea behind _____ is to take the massive amounts of idle capacity sitting on desktops and in server farms and put it to use performing complex calculations that would otherwise have to be done on very large parallel supercomputers that would cost millions of dollars.

A. grid computing

B. virtual application providers

C. network servers

D. expert systems

E. executive decision systems

 

 

FILL-IN-THE-BLANK QUESTIONS

 

1. _____ is the equipment and techniques used to manage and process information.

 

2. _____ are workers who or use knowledge, contributing to and benefiting from information used in performing, planning, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions.

 

3. A _____ is an electronic filing system that collects and organizes data and information.

 

4. A _____ connects computers at different sites via telecommunications media such as phone lines, satellites, and microwaves.

 

5. An ______ is an internal corporate wide area network that uses Internet technology to link employees in may locations with different types of computers.

 

6. _____ are private corporate networks connected over a public network, like the Internet, that include strong security measures which allow only authorized users to access the network.

LEARNING OUTCOME: 2

 

7. An _____ is a customizable internal Web site that provides proprietary corporate information to a defined user group, such as employees, supply chain partners, or customers.

 

8. An _____ is a service company that buys and maintains software on its servers and distributes it through high-speed networks to subscribers for a set period of time and price.

 

9. When data are processed upon receipt and immediately put into the data-processing system, the firm is using a(n) _____ processing system.

 

10. A ____ is any information technology that combines many databases across an entire company into one central database that supports management decision making.

 

11. A _____ system helps managers make decisions using computer models that describe the real world.

 

12. An _____ gives managers advice similar to what they would get from a human consultant.  This type of management support software uses artificial intelligence to solve problems in much the same way humans do.

 

13. _____ focuses on gathering and sharing an organization’s knowledge to improve productivity and foster innovation.

 

14. A _____ is a computer program that copies itself into other software and can spread to other computer systems.

 

15. _____ is a sophisticated database application that looks for hidden patterns in a group of data to help track and predict future behavior.

 

 

 

SHORT ANSWER QUESTIONS

 

 

1. What is information technology (IT)?

 

2. What does the statement, “Today most of us are knowledge workers,” mean?

 

3. According to the text, “Networks include clients and servers.”  What are clients and servers?

 

4. What are the two basic kinds of networks?

 

5. How do salespeople benefit from the development of virtual private networks (VPNs)?

 

6. Which type of management support system would only be used by operational managers?

 

7 What kind of software system would be used for answering “what if” questions?

 

8 Which management support system uses artificial intelligence?

 

9. What is knowledge management?

 

10. Describe software piracy?

 

11. How does spam pose a security threat for organizations?

 

12. A catalog retailer like Lands’ End knows that customers who purchased a stocking cap are also likely purchasers of down pillows and that customers who buy flannel sheets are also likely to buy fragrance candles.  What technique do catalog retailers use to learn such information?

 

13. What is the function of digital forensics?

 

14. Archeologists at Shiloh, Tennessee, are exploring a mound built over 1,000 years ago.  They have catalogues thousands of fragments of wood, pottery, and bone, which they want to analyze and compare to locate patterns of use.  Since they cannot afford to purchase computers capable of making such sophisticated comparisons, what would you recommend they use?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

6.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE