Deck 14: Using Technology to Manage Information

ملء الشاشة (f)
exit full mode
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
________ uses powerful servers to store applications software and databases for users to access via the Web.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n)_______.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n)_____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n)_____.
سؤال
Describe how the role of the chief information officer has changed in recent years.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n)_____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
The purpose of a(n)________ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_______ consist of raw facts and figures that may or may not be relevant to business decisions.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as __________.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
________ software secretly gathers user information through the user's Internet connection without the user's knowledge.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____________ is a computer program that imitates human thinking through complicated sets of "if/then" rules.
سؤال
Explain the difference between data and information.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n)_____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an executive responsible for managing a firm's information system and related computer technologies.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)________ is a network of PCs that have been infected with one or more data-stealing viruses.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
سؤال
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)________.

A) decision support system
B) expert system
C) executive information system
D) database
سؤال
William is trying to close a particularly difficult sale.He uses his PDA (personal digital assistant)and a special program to access information within his company's database on pricing.William is using an________.

A) expert system
B) enterprise resource planning system
C) executive support system
D) application service provider
سؤال
The person who directs a firm's management information systems and related computer operations is often called the ________.

A) financial advisor
B) chief information officer
C) executive information manager
D) chief executive officer
سؤال
What is a decision support system? How does a decision support system differ from an expert system?
سؤال
How are computers classified?
سؤال
Identify four significant trends regarding information systems.
سؤال
Explain the difference between hardware and software.Give examples of both.
سؤال
Which of the following statements best describes the purpose of a management information system?

A) Provide management with feedback from sales meetings
B) Assist the human resources department with research on employee benefit costs
C) Provide the accounting department with budget information
D) Provide information on internal operations and external intelligence for use in decision making
سؤال
Megan,a chief executive officer,reviews the internal performance of her company's stock,as well as market trends for the industry.To access this information,Megan uses a(n)________.

A) executive support system
B) expert system
C) enterprise planning resource
D) decision support system
سؤال
List and briefly explain the most widely used business applications of computers.
سؤال
What are some ways that businesses can protect themselves from computer crimes?
سؤال
Hannah is a television executive whose team conducted demographic research for new programs.Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A) database
B) information
C) data
D) groupware
سؤال
A database can best be described as ________.

A) a centralized integrated collection of the organization's data resources
B) a loose collection of ideas
C) data that has been converted into information
D) data gathered at random from a variety of sources
سؤال
Explain the differences among a virus,a worm,and a Trojan horse.
سؤال
Which of the following is considered information rather than data?

A) Projected population growth in a target market
B) A measure of the effectiveness of a promotional strategy
C) Income distribution in a target market
D) Product sales in various categories
سؤال
What is disaster recovery planning?
سؤال
Explain the difference between an intranet and a virtual private network.
سؤال
Raw facts and figures are ________.

A) data
B) information
C) a management information system
D) the basis for business decision making
سؤال
Sean is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Sean used the firm's ________ system.

A) expert
B) enterprise resource planning
C) executive information
D) decision support
سؤال
Provide examples of ethical concerns regarding technology and information systems.
سؤال
Which of the following is a storage device?

A) Flash memory card
B) Modem
C) Monitor
D) Scanner
سؤال
________ software controls the basic workings of the computer system.

A) Expert
B) Executive information system
C) Database
D) Operating
سؤال
On Realtor.com,homebuyers enter information regarding their preferred home location,price,and features.Using an ________,the website will automatically display real estate properties that match the homebuyer's criteria.

A) executive information system
B) encryption
C) application service provider
D) expert system
سؤال
________ tie geographic regions together using long-distance telephone lines or satellite transmissions.

A) Local area networks
B) Executive information systems
C) Databases
D) Wide area networks
سؤال
Mari is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Mari's company has a(n)________.

A) Internet
B) virtual private network
C) intranet
D) extranet
سؤال
Which of the following is an application program?

A) Microsoft Excel
B) Microsoft Windows
C) UNIX
D) Java
سؤال
Hans works in the mortgage loan department of a bank.He enters information on credit applications into the bank's computer system.The system has a program that evaluates the loan application and gives it a score.Hans is using a(n)________.

A) information interface
B) expert system
C) enterprise resource planning system
D) decision support system
سؤال
Which of the following is the most recent development in notebook computers?

A) Netbook
B) Minicomputer
C) Tablet PC
D) PDA
سؤال
Chloe would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares,territories,and projected sales.In order to achieve maximum impact,Chloe should communicate her information via ________.

A) desktop publishing
B) production software
C) staging software
D) presentation software
سؤال
Which of the following reasons is not a reason for the increasing popularity of notebook computers?

A) More durable designs
B) Improved displays
C) Faster processing speeds
D) Higher prices
سؤال
Electronic spreadsheets ________.

A) are used for numeric and statistical data
B) are very difficult to use
C) are a special software used to create graphics
D) can replace managerial judgment in decision making
سؤال
An expert system would most likely be used to ________.

A) retrieve sales data
B) determine the status of a customer's order
C) determine the optimal layout of a plant
D) access relevant data from the company's database
سؤال
All of the following devices are computer hardware EXCEPT a ________.

A) fax machine
B) monitor
C) mouse
D) printer driver
سؤال
Kyle is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts or graphs that he will then show as slides.Which of the following software programs is Kyle most likely using to create his presentation?

A) Microsoft Word
B) Microsoft Excel
C) Microsoft Windows
D) Microsoft PowerPoint
سؤال
A computer program that imitates human thinking is a(n)________.

A) information interface
B) decision support system
C) enterprise resource planning system
D) expert system
سؤال
Angelo purchases a new game for his computer.He will load the program onto the computer's hard drive.Angelo is buying ________.

A) application software
B) an operating system
C) a warranty
D) an output device
سؤال
Brian is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Brian likely using to create the brochure?

A) Word processing program
B) Desktop publishing program
C) Presentation graphics program
D) Spreadsheet program
سؤال
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A) midrange system
B) mainframe computer
C) hand-held device
D) personal computer
سؤال
Carmen is sitting at her computer analyzing the financial impact on an increase in her company's sales growth rate.Carmen is probably using a ________ program.

A) word processing
B) desktop publishing
C) spreadsheet
D) presentation
سؤال
A program that performs specific tasks that the user wants to carry out is called ________.

A) software
B) the operating system
C) a management information system
D) application software
سؤال
A new wireless standard called ________ has the potential to bring high-speed Internet access to rural areas where traditional forms of broadband access are too expensive or impractical.

A) VPN
B) Wi-Max
C) VoIP
D) intranet
سؤال
Jennifer belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

A) worm
B) software application
C) Trojan horse
D) firewall
سؤال
Information is the result of processed data.
سؤال
Data alone are of limited value to a company.
سؤال
The main purpose of management information systems is to help managers make better decisions.
سؤال
All of the following are advantages of VoIP EXCEPT ________.

A) lower cost
B) additional features
C) increased flexibility
D) increased security
سؤال
Information overload is more of a problem today because of improved technology.
سؤال
Caleb's company has installed a system to make data transmission secure.Therefore,he can use the Internet to send and receive sensitive data.Caleb's company has installed a(n)________.

A) intranet
B) virtual private network
C) extranet
D) wide area network
سؤال
Deciding how to prevent system failures along with the ability to continue operating if computer systems fail is called ________.

A) disaster recovery planning
B) information systems management
C) advanced computer security
D) virus protection
سؤال
Sales figures are an example of information.
سؤال
The heart of a management information system is the database.
سؤال
Mario downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause was a(n)________.

A) computer virus
B) malfunctioning computer
C) bad operating system
D) intranet failure
سؤال
Which of the following statements is true about intranets?

A) Intranets require a Windows operation system.
B) Intranets may be accessed by anyone with an Internet connection.
C) Intranets provide secure connections between two points on the Internet.
D) Intranets allow information sharing within a company network.
سؤال
A program that attaches itself to other programs and changes programs or destroys data is a(n)________.

A) computer virus
B) purge program
C) inoculation program
D) immunity deficiency program
سؤال
Transaction processing systems and process control systems are examples of operational support systems.
سؤال
All of the following are reasonable responses to potential computer problems EXCEPT ________.

A) routinely backing up software and data
B) installing extra hardware in a secure location
C) limiting computer access to only a handful of senior managers
D) using online storage services
سؤال
Diego purchased a company and discovered that his employees were using different operating systems.Instead of spending considerable time and expense getting everyone on the same system,Diego established a(n)________ to create company bulletin boards,share documents,and conduct online conferencing.

A) extranet
B) intranet
C) virtual private network
D) Internet
سؤال
All Wal-Mart stores have satellite dishes that link stores together with the company's headquarters.Wal-Mart is using a(n)________.

A) local area network
B) expert system
C) wide area network
D) enterprise resource system
سؤال
Courtney's office in Manitoba was destroyed by a flood last year,and she lost numerous company documents.After relocating,Courtney took no chances and implemented ________,in which she backed up her data in a secure online storage service.

A) enterprise resource planning
B) firewall
C) encryption
D) disaster recovery planning
سؤال
An outside supplier used to provide computer and application support for managing an information system is known as ________.

A) an application maintenance provider
B) an application service provider
C) on-demand computing
D) utility computing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/113
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
________ uses powerful servers to store applications software and databases for users to access via the Web.
q
2
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
l
3
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n)_______.
p
4
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n)_____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
5
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n)_____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
6
Describe how the role of the chief information officer has changed in recent years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
7
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n)_____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
8
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
The purpose of a(n)________ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
9
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
10
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
_______ consist of raw facts and figures that may or may not be relevant to business decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
11
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
12
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
________ software secretly gathers user information through the user's Internet connection without the user's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
13
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____________ is a computer program that imitates human thinking through complicated sets of "if/then" rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
14
Explain the difference between data and information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
15
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n)_____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
16
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an executive responsible for managing a firm's information system and related computer technologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
17
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
18
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
19
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)________ is a network of PCs that have been infected with one or more data-stealing viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
20
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
21
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)________.

A) decision support system
B) expert system
C) executive information system
D) database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
22
William is trying to close a particularly difficult sale.He uses his PDA (personal digital assistant)and a special program to access information within his company's database on pricing.William is using an________.

A) expert system
B) enterprise resource planning system
C) executive support system
D) application service provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
23
The person who directs a firm's management information systems and related computer operations is often called the ________.

A) financial advisor
B) chief information officer
C) executive information manager
D) chief executive officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is a decision support system? How does a decision support system differ from an expert system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
25
How are computers classified?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
26
Identify four significant trends regarding information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
27
Explain the difference between hardware and software.Give examples of both.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following statements best describes the purpose of a management information system?

A) Provide management with feedback from sales meetings
B) Assist the human resources department with research on employee benefit costs
C) Provide the accounting department with budget information
D) Provide information on internal operations and external intelligence for use in decision making
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
29
Megan,a chief executive officer,reviews the internal performance of her company's stock,as well as market trends for the industry.To access this information,Megan uses a(n)________.

A) executive support system
B) expert system
C) enterprise planning resource
D) decision support system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
30
List and briefly explain the most widely used business applications of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are some ways that businesses can protect themselves from computer crimes?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
32
Hannah is a television executive whose team conducted demographic research for new programs.Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A) database
B) information
C) data
D) groupware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
33
A database can best be described as ________.

A) a centralized integrated collection of the organization's data resources
B) a loose collection of ideas
C) data that has been converted into information
D) data gathered at random from a variety of sources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
34
Explain the differences among a virus,a worm,and a Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is considered information rather than data?

A) Projected population growth in a target market
B) A measure of the effectiveness of a promotional strategy
C) Income distribution in a target market
D) Product sales in various categories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is disaster recovery planning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
37
Explain the difference between an intranet and a virtual private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
38
Raw facts and figures are ________.

A) data
B) information
C) a management information system
D) the basis for business decision making
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
39
Sean is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Sean used the firm's ________ system.

A) expert
B) enterprise resource planning
C) executive information
D) decision support
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
40
Provide examples of ethical concerns regarding technology and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following is a storage device?

A) Flash memory card
B) Modem
C) Monitor
D) Scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ software controls the basic workings of the computer system.

A) Expert
B) Executive information system
C) Database
D) Operating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
43
On Realtor.com,homebuyers enter information regarding their preferred home location,price,and features.Using an ________,the website will automatically display real estate properties that match the homebuyer's criteria.

A) executive information system
B) encryption
C) application service provider
D) expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ tie geographic regions together using long-distance telephone lines or satellite transmissions.

A) Local area networks
B) Executive information systems
C) Databases
D) Wide area networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
45
Mari is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Mari's company has a(n)________.

A) Internet
B) virtual private network
C) intranet
D) extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is an application program?

A) Microsoft Excel
B) Microsoft Windows
C) UNIX
D) Java
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
47
Hans works in the mortgage loan department of a bank.He enters information on credit applications into the bank's computer system.The system has a program that evaluates the loan application and gives it a score.Hans is using a(n)________.

A) information interface
B) expert system
C) enterprise resource planning system
D) decision support system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is the most recent development in notebook computers?

A) Netbook
B) Minicomputer
C) Tablet PC
D) PDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
49
Chloe would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares,territories,and projected sales.In order to achieve maximum impact,Chloe should communicate her information via ________.

A) desktop publishing
B) production software
C) staging software
D) presentation software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following reasons is not a reason for the increasing popularity of notebook computers?

A) More durable designs
B) Improved displays
C) Faster processing speeds
D) Higher prices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
51
Electronic spreadsheets ________.

A) are used for numeric and statistical data
B) are very difficult to use
C) are a special software used to create graphics
D) can replace managerial judgment in decision making
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
52
An expert system would most likely be used to ________.

A) retrieve sales data
B) determine the status of a customer's order
C) determine the optimal layout of a plant
D) access relevant data from the company's database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
53
All of the following devices are computer hardware EXCEPT a ________.

A) fax machine
B) monitor
C) mouse
D) printer driver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
54
Kyle is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts or graphs that he will then show as slides.Which of the following software programs is Kyle most likely using to create his presentation?

A) Microsoft Word
B) Microsoft Excel
C) Microsoft Windows
D) Microsoft PowerPoint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
55
A computer program that imitates human thinking is a(n)________.

A) information interface
B) decision support system
C) enterprise resource planning system
D) expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
56
Angelo purchases a new game for his computer.He will load the program onto the computer's hard drive.Angelo is buying ________.

A) application software
B) an operating system
C) a warranty
D) an output device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
57
Brian is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Brian likely using to create the brochure?

A) Word processing program
B) Desktop publishing program
C) Presentation graphics program
D) Spreadsheet program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
58
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A) midrange system
B) mainframe computer
C) hand-held device
D) personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
59
Carmen is sitting at her computer analyzing the financial impact on an increase in her company's sales growth rate.Carmen is probably using a ________ program.

A) word processing
B) desktop publishing
C) spreadsheet
D) presentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
60
A program that performs specific tasks that the user wants to carry out is called ________.

A) software
B) the operating system
C) a management information system
D) application software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
61
A new wireless standard called ________ has the potential to bring high-speed Internet access to rural areas where traditional forms of broadband access are too expensive or impractical.

A) VPN
B) Wi-Max
C) VoIP
D) intranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
62
Jennifer belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

A) worm
B) software application
C) Trojan horse
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
63
Information is the result of processed data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
64
Data alone are of limited value to a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
65
The main purpose of management information systems is to help managers make better decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
66
All of the following are advantages of VoIP EXCEPT ________.

A) lower cost
B) additional features
C) increased flexibility
D) increased security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
67
Information overload is more of a problem today because of improved technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
68
Caleb's company has installed a system to make data transmission secure.Therefore,he can use the Internet to send and receive sensitive data.Caleb's company has installed a(n)________.

A) intranet
B) virtual private network
C) extranet
D) wide area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
69
Deciding how to prevent system failures along with the ability to continue operating if computer systems fail is called ________.

A) disaster recovery planning
B) information systems management
C) advanced computer security
D) virus protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
70
Sales figures are an example of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
71
The heart of a management information system is the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
72
Mario downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause was a(n)________.

A) computer virus
B) malfunctioning computer
C) bad operating system
D) intranet failure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following statements is true about intranets?

A) Intranets require a Windows operation system.
B) Intranets may be accessed by anyone with an Internet connection.
C) Intranets provide secure connections between two points on the Internet.
D) Intranets allow information sharing within a company network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
74
A program that attaches itself to other programs and changes programs or destroys data is a(n)________.

A) computer virus
B) purge program
C) inoculation program
D) immunity deficiency program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
75
Transaction processing systems and process control systems are examples of operational support systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
76
All of the following are reasonable responses to potential computer problems EXCEPT ________.

A) routinely backing up software and data
B) installing extra hardware in a secure location
C) limiting computer access to only a handful of senior managers
D) using online storage services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
77
Diego purchased a company and discovered that his employees were using different operating systems.Instead of spending considerable time and expense getting everyone on the same system,Diego established a(n)________ to create company bulletin boards,share documents,and conduct online conferencing.

A) extranet
B) intranet
C) virtual private network
D) Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
78
All Wal-Mart stores have satellite dishes that link stores together with the company's headquarters.Wal-Mart is using a(n)________.

A) local area network
B) expert system
C) wide area network
D) enterprise resource system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
79
Courtney's office in Manitoba was destroyed by a flood last year,and she lost numerous company documents.After relocating,Courtney took no chances and implemented ________,in which she backed up her data in a secure online storage service.

A) enterprise resource planning
B) firewall
C) encryption
D) disaster recovery planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
80
An outside supplier used to provide computer and application support for managing an information system is known as ________.

A) an application maintenance provider
B) an application service provider
C) on-demand computing
D) utility computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 113 في هذه المجموعة.