Deck 14: Using Technology to Manage Information

ملء الشاشة (f)
exit full mode
سؤال
A(n) ____________ gives support to businesspeople during the decision-making process.

A) database
B) management information system
C) decision support system
D) expert system
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a software program that performs the specific tasks that the user wants to carry out?

A) consumer software
B) enterprise software
C) application software
D) presentation software
سؤال
The executive responsible for managing a firm's information systems and related computer technologies.

A) IVP
B) CIS
C) PIT
D) CIO
سؤال
SpaceX and Airbnb are examples of companies referred to as _________________ which use innovative business models to bring about disruption in a particular industry.

A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
سؤال
Which of the following is not one of the components of a computer-based information system?

A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
سؤال
A(n) _________ is a management support system that imitates human thinking through "if-then" rules.

A) decision support system
B) management information system
C) executive support system
D) expert system
سؤال
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.

A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
سؤال
The application software that would be best suited for creating a sales presentation is

A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
سؤال
How is data different from information?

A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
سؤال
All of the following are examples of application software except:

A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
سؤال
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
سؤال
A smart phone is a device that combines a cell phone with a PDA.
سؤال
Computer-based information systems consist of all of the following components except

A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
سؤال
Technology is allowing firms to track business activities almost instantaneously. Package delivery companies such as FedEx and UPS use __________ to transmit information within seconds to the package sender.

A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
سؤال
All of the following are ways technology has forever changed today's business except:

A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
سؤال
An information system should ______________________________________.

A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
سؤال
Information that can be stored and retrieved for use is kept in a __________.

A) server
B) data system
C) information system
D) database
سؤال
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.

A) data information system
B) expert system
C) data processing system
D) information system
سؤال
The fourth industrial revolution has been powered by _____________________________.

A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
سؤال
The heart of any information system is its ______________________________.

A) information system
B) database
C) DSS
D) ESS
سؤال
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called _____________________________________.

A) virtual private network
B) dial-up
C) Skype
D) VoIP
سؤال
The current standard for wireless networks is called a _______________________________.

A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
سؤال
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform

A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
سؤال
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
سؤال
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering

A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
سؤال
The first step in off-site data storage is ________________________________.

A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
سؤال
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
سؤال
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes, is referred to as (a) ______________________.

A) Trojan horse
B) cookie
C) spyware
D) botnet
سؤال
WANs are networks designed to connect a company's employees on multiple floors of an office high-rise.
سؤال
JetBlue reservation agents work in ___________, an example of a ___________.

A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
سؤال
_________ can be an outcome of poorly protecting employee or customer data.

A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
سؤال
A Trojan horse ______________________________________________.

A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
سؤال
All of the following are examples of e-crimes except:

A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
سؤال
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.

A) database management
B) cloud computing
C) grid computing
D) on-demand computing
سؤال
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.

A) Trojan horse
B) cookie
C) worm
D) virus
سؤال
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a

A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
سؤال
A computer network that is similar to the Internet but limits access to authorized users is referred to as which of the following?

A) firewalls
B) intranets
C) extranet
D) virtual private network
سؤال
MAC users are less vulnerable to cybercrimes because of storage of data in the cloud rather than on hard drives.
سؤال
Any malicious software program designed to infect computer systems is referred to as (a):

A) Trojan horse.
B) cookie.
C) malware.
D) virus.
سؤال
A computer network that connects machines within limited areas, such as a building or several nearby buildings, is called a ______________________________________.

A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
سؤال
A network of smaller computers that run special software is referred to as ???_____________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
سؤال
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.

A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
سؤال
Virtual offices are trend-driven and are becoming less used by businesses.
a) True
b) False
سؤال
Another term used for on-demand computing is ______________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
A(n) ____________ gives support to businesspeople during the decision-making process.

A) database
B) management information system
C) decision support system
D) expert system
C
2
Which of the following is a software program that performs the specific tasks that the user wants to carry out?

A) consumer software
B) enterprise software
C) application software
D) presentation software
D
3
The executive responsible for managing a firm's information systems and related computer technologies.

A) IVP
B) CIS
C) PIT
D) CIO
D
4
SpaceX and Airbnb are examples of companies referred to as _________________ which use innovative business models to bring about disruption in a particular industry.

A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not one of the components of a computer-based information system?

A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n) _________ is a management support system that imitates human thinking through "if-then" rules.

A) decision support system
B) management information system
C) executive support system
D) expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
7
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.

A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
8
The application software that would be best suited for creating a sales presentation is

A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
9
How is data different from information?

A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
10
All of the following are examples of application software except:

A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
11
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
12
A smart phone is a device that combines a cell phone with a PDA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
13
Computer-based information systems consist of all of the following components except

A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
14
Technology is allowing firms to track business activities almost instantaneously. Package delivery companies such as FedEx and UPS use __________ to transmit information within seconds to the package sender.

A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
15
All of the following are ways technology has forever changed today's business except:

A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
16
An information system should ______________________________________.

A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
17
Information that can be stored and retrieved for use is kept in a __________.

A) server
B) data system
C) information system
D) database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.

A) data information system
B) expert system
C) data processing system
D) information system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
19
The fourth industrial revolution has been powered by _____________________________.

A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
20
The heart of any information system is its ______________________________.

A) information system
B) database
C) DSS
D) ESS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
21
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called _____________________________________.

A) virtual private network
B) dial-up
C) Skype
D) VoIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
22
The current standard for wireless networks is called a _______________________________.

A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
23
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform

A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
24
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
25
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering

A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
26
The first step in off-site data storage is ________________________________.

A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
27
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
28
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes, is referred to as (a) ______________________.

A) Trojan horse
B) cookie
C) spyware
D) botnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
29
WANs are networks designed to connect a company's employees on multiple floors of an office high-rise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
30
JetBlue reservation agents work in ___________, an example of a ___________.

A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
31
_________ can be an outcome of poorly protecting employee or customer data.

A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
32
A Trojan horse ______________________________________________.

A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
33
All of the following are examples of e-crimes except:

A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
34
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.

A) database management
B) cloud computing
C) grid computing
D) on-demand computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
35
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.

A) Trojan horse
B) cookie
C) worm
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
36
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a

A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
37
A computer network that is similar to the Internet but limits access to authorized users is referred to as which of the following?

A) firewalls
B) intranets
C) extranet
D) virtual private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
38
MAC users are less vulnerable to cybercrimes because of storage of data in the cloud rather than on hard drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
39
Any malicious software program designed to infect computer systems is referred to as (a):

A) Trojan horse.
B) cookie.
C) malware.
D) virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
40
A computer network that connects machines within limited areas, such as a building or several nearby buildings, is called a ______________________________________.

A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
41
A network of smaller computers that run special software is referred to as ???_____________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
42
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.

A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
43
Virtual offices are trend-driven and are becoming less used by businesses.
a) True
b) False
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
44
Another term used for on-demand computing is ______________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.