Deck 14: Using Technology to Manage Information

ملء الشاشة (f)
exit full mode
سؤال
All of the following are examples of cybercrimes except:

A) Employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) Employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) When A calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) Unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
سؤال
The current standard for wireless networks is called a:

A) Hot spot.
B) Local area network (LAN).
C) Wide area network (WAN).
D) Wireless fidelity (WiFi).
سؤال
Microsoft Outlook is an example of which one of the following types of applications software?

A) Personal information managers
B) Database programs
C) Spreadsheets
D) Word processing
سؤال
An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence is called _______.

A) Database
B) Information system
C) Management information system
D) Data system
سؤال
Which one of the following statements concerning a database is incorrect?

A) Databases can be built internally.
B) Databases are centralized integrated collection of data resources.
C) Databases always provide relevant data.
D) Databases act as electronic filing cabinets.
سؤال
A disruptive innovation is called an/a _________________________________________.

A) innovation that entirely changes the present market
B) innovation that sets the entire industry back a few years
C) annoyance that confuses manufacturing
D) service that cannot be replicated and is short-lived
سؤال
Computer-based information systems consist of the following component(s).

A) Computer hardware
B) Computer software
C) Data resource management
D) All of the above
سؤال
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called

A) VPN.
B) VPV.
C) IvP.
D) VoIP.
سؤال
An operational support system that records and processes business transaction data is referred to as a:

A) Management information system
B) Decision support system
C) Process control system
D) Transaction processing system
سؤال
Systems that imitate human thinking through complicated sets of "if-then" rules are referred to as:

A) Process control systems
B) Decision support systems
C) Expert systems
D) Executive Support Systems
سؤال
A centralized integrated collection of data resources is called:

A) Data mining
B) A database
C) An online system
D) Transaction processing system
سؤال
A significant trend in information systems includes:

A) The growing demands of the so-called distributed workforce.
B) The increased use of Internet service providers.
C) On-demand group computing.
D) Cloud and grip computing.
سؤال
Which of the following represents inputs for computer hardware?

A) Allow users to enter data and commands
B) Keyboard
C) Mouse
D) All of the above
سؤال
A computer network that is similar to the Internet, but limits access to authorized users is called _________________.

A) Internal internet
B) Network
C) Intranet
D) Extranet
سؤال
Using computer-based technology to retrieve and evaluate data in a database for the purpose of identifying trends is called

A) Business intelligence.
B) Data stockpiling.
C) Information mining.
D) Data servicing.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
All of the following are examples of cybercrimes except:

A) Employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) Employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) When A calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) Unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
C
2
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
B
3
The current standard for wireless networks is called a:

A) Hot spot.
B) Local area network (LAN).
C) Wide area network (WAN).
D) Wireless fidelity (WiFi).
D
4
Microsoft Outlook is an example of which one of the following types of applications software?

A) Personal information managers
B) Database programs
C) Spreadsheets
D) Word processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
5
An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence is called _______.

A) Database
B) Information system
C) Management information system
D) Data system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which one of the following statements concerning a database is incorrect?

A) Databases can be built internally.
B) Databases are centralized integrated collection of data resources.
C) Databases always provide relevant data.
D) Databases act as electronic filing cabinets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
7
A disruptive innovation is called an/a _________________________________________.

A) innovation that entirely changes the present market
B) innovation that sets the entire industry back a few years
C) annoyance that confuses manufacturing
D) service that cannot be replicated and is short-lived
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
8
Computer-based information systems consist of the following component(s).

A) Computer hardware
B) Computer software
C) Data resource management
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
9
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called

A) VPN.
B) VPV.
C) IvP.
D) VoIP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
10
An operational support system that records and processes business transaction data is referred to as a:

A) Management information system
B) Decision support system
C) Process control system
D) Transaction processing system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
11
Systems that imitate human thinking through complicated sets of "if-then" rules are referred to as:

A) Process control systems
B) Decision support systems
C) Expert systems
D) Executive Support Systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
12
A centralized integrated collection of data resources is called:

A) Data mining
B) A database
C) An online system
D) Transaction processing system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
13
A significant trend in information systems includes:

A) The growing demands of the so-called distributed workforce.
B) The increased use of Internet service providers.
C) On-demand group computing.
D) Cloud and grip computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following represents inputs for computer hardware?

A) Allow users to enter data and commands
B) Keyboard
C) Mouse
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
15
A computer network that is similar to the Internet, but limits access to authorized users is called _________________.

A) Internal internet
B) Network
C) Intranet
D) Extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
16
Using computer-based technology to retrieve and evaluate data in a database for the purpose of identifying trends is called

A) Business intelligence.
B) Data stockpiling.
C) Information mining.
D) Data servicing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.