Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link

ملء الشاشة (f)
exit full mode
سؤال
Cloud resources are not confined to a specific platform or operating system.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.
سؤال
Hardware includes the various components of a computer system along with communications and network equipment.
سؤال
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)Intranet
D)Extranet
سؤال
When music is shared on the Internet, it is not considered piracy, since music is no longer considered intellectual property.
سؤال
The benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it requires only one major investment for the security of their data.
C)it allows them to communicate with their friends and relatives in any part of the world without being connected to the Internet.
D)it allows them to store large files without taking up valuable space on their computers' hard drives.
سؤال
Data become _____ when they are processed, organized, and presented in a way that makes them useful to a decision maker in a company.

A)knowledge
B)values
C)information
D)metadata
سؤال
Habib is a writer. He regularly uses Microsoft Word for his work so he can write, edit, and prepare his manuscripts for publication. In this scenario, which of the following computer products is Habib using?

A)A firewall
B)Antivirus software
C)Applications software
D)Operating system software
سؤال
The two broad categories of software are:​

A) text software and data software.
B)entertainment software and business software.
C)resident software and extrinsic software.
D)system software and application software.
سؤال
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
سؤال
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
سؤال
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
سؤال
_____ is a network based on fiber-optic cable, which uses high-speed connectivity to improve education, research, and collaboration.

A)Intranet
B)Internet2
C)Broadband
D)Extranet
سؤال
Firms create _____ by offering limited access to certain areas of their intranets to select groups of people.

A)open systems
B)expert systems
C)horizontally integrated networks
D)extranets
سؤال
Business intelligence systems are a new class of decision support systems developed over the past two decades.
سؤال
Cloud computing is most likely to:

A)eliminate the threat of computer viruses.
B)create a need for greater purchases of hardware by the IT department of companies.
C)allow companies access to a vast array of computing resources without the need to invest heavily in IT personnel.
D)increase costs since employees will be required to use similar computer systems.
سؤال
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
سؤال
Intellectual property refers to products that result from creative effort, such as books, musical works, inventions, and computer software.
سؤال
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (Cad.
C)expert systems (ES)
D)Hypertext Markup Language (HTML)
سؤال
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
سؤال
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Spamming
B)Booting
C)Phishing
D)Coding
سؤال
Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.

A)passwords
B)software
C)usernames
D)keywords
سؤال
_____ occurs when someone reproduces and distributes copyright protected work without obtaining permission from-or providing compensation to-the owner of the material.

A)Hacking
B)Contract cheating
C)Identity theft
D)Piracy
سؤال
Recently, Candice found it difficult to find legitimate email messages due to the hundreds of unsolicited commercial emails in her inbox. To prevent this from occurring in the future, Candice should install a _____.

A)spam filter
B)cyber net filter
C)pharming filter
D)spyware program
سؤال
_____ are best described as specialized Internet sites, which provide a platform to interact for businesses, specifically those involved in business-to-business (B2B)transactions.

A)Social networking sites
B)E-marketplaces
C)Blogs
D)I-commerce sites
سؤال
In the _____ form of e-commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.

A)business-to-government
B)business-to-consumer
C)business-to-business
D)consumer-to-consumer
سؤال
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard for the users' interest in the product or its promotion.

A)Cyberware
B)Spam
C)Opt-in email
D)Malware
سؤال
_____ is software that installs itself on a computer without permission and then tracks its behavior in some way.

A)Adware
B)Screenware
C)Freeware
D)Spyware
سؤال
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?​

A)Computer worms
B) Computer viruses​
C)Freewares
D)Spywares
سؤال
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Enterprise content management
D)Social commerce
سؤال
_____ is a technology that stores information on a microchip-such as a unique serial number-and transmits it to a reader when it is within range.

A)Global positioning system
B)Computer-aided design
C)Graphical user interface
D)Radio frequency identification
سؤال
A(n)_____ is similar to a virus, except that it is an independent program that can be spread across computer networks without being attached to other files.

A)worm
B)spam program
C)spyware
D)adware
سؤال
Which of the following statements is true of business-to-business (B2B)e-commerce?

A)It involves much less negotiation than business-to-consumer (B2C) e-commerce.
B)It involves businesses selling supplies, components, machinery, equipment, or services to individual final consumers.
C)It involves much less investment than business-to-consumer (B2C) e-commerce.
D)It involves businesses selling supplies, components, machinery, equipment, or services to other businesses.
سؤال
_____ is best described as an Internet advertising strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.

A)Phishing
B)Supply-chaining
C)E-tailing
D)Viral marketing
سؤال
The approach to make e-commerce sites more interactive and collaborative, with customers providing most of the content, as well as a richer, more interesting, and more useful experience is known as _____.

A)Web 2.0
B)Internet5
C)Internet2
D)Web 2.2
سؤال
When a person buys stocks through an online broker such as Charles Schwab, he or she participates in _____ e-commerce.

A)business-to-business
B)business-to-government
C)business-to-consumer
D)consumer-to-consumer
سؤال
A(n)_____ is a decision support system that helps managers make better decisions in an area where they lack sufficient knowledge.

A)expert system
B)data mine
C)graphical user interface
D)utility system
سؤال
A(n)_____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)decision support system
B)intranet
C)cybermediary
D)expert system
سؤال
_____ are files of related facts and figures organized according to a logical system and stored on hard drives or some other computer-accessible storage media.

A) Extranets
B) Databases
C)Intranets
D)Data mines
سؤال
In _____ e-commerce, many purchases may be based on impulse.

A)business-to-business
B)business-to-consumer
C)business-to-government
D)consumer-to-business
سؤال
What is the purpose of system software? Describe operating systems and utility programs.
سؤال
_________ refers to the programs that provide instructions to a computer so that it can perform a desired task.

A)Hardware
B)Software
C)Intranet
D)Extranet
سؤال
What are the benefits of cloud computing?
سؤال
_________ give managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)Decision support systems
B)Extranets
C)Intranets
D)System software
سؤال
List and describe the ethical and legal challenges that information technology raises.
سؤال
_________ are skilled computer users who have the expertise to gain unauthorized access to other people's computers.

A)Phishers
B)Spammers
C)Pirates
D)Hackers
سؤال
Discuss four advantages that businesses using e-marketplaces enjoy.
سؤال
A _________ is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)spyware
C)query
D)worm
سؤال
Compare and contrast intranets and extranets.
سؤال
A(n)_________ is an Internet-based firm that specializes in the secure electronic transfer of funds.

A)firewall
B)data warehouse
C)cybermediary
D)extranet
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link
1
Cloud resources are not confined to a specific platform or operating system.
True
2
"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.
False
3
Hardware includes the various components of a computer system along with communications and network equipment.
True
4
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)Intranet
D)Extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
When music is shared on the Internet, it is not considered piracy, since music is no longer considered intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it requires only one major investment for the security of their data.
C)it allows them to communicate with their friends and relatives in any part of the world without being connected to the Internet.
D)it allows them to store large files without taking up valuable space on their computers' hard drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Data become _____ when they are processed, organized, and presented in a way that makes them useful to a decision maker in a company.

A)knowledge
B)values
C)information
D)metadata
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Habib is a writer. He regularly uses Microsoft Word for his work so he can write, edit, and prepare his manuscripts for publication. In this scenario, which of the following computer products is Habib using?

A)A firewall
B)Antivirus software
C)Applications software
D)Operating system software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The two broad categories of software are:​

A) text software and data software.
B)entertainment software and business software.
C)resident software and extrinsic software.
D)system software and application software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
_____ is a network based on fiber-optic cable, which uses high-speed connectivity to improve education, research, and collaboration.

A)Intranet
B)Internet2
C)Broadband
D)Extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Firms create _____ by offering limited access to certain areas of their intranets to select groups of people.

A)open systems
B)expert systems
C)horizontally integrated networks
D)extranets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Business intelligence systems are a new class of decision support systems developed over the past two decades.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Cloud computing is most likely to:

A)eliminate the threat of computer viruses.
B)create a need for greater purchases of hardware by the IT department of companies.
C)allow companies access to a vast array of computing resources without the need to invest heavily in IT personnel.
D)increase costs since employees will be required to use similar computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Intellectual property refers to products that result from creative effort, such as books, musical works, inventions, and computer software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (Cad.
C)expert systems (ES)
D)Hypertext Markup Language (HTML)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Spamming
B)Booting
C)Phishing
D)Coding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.

A)passwords
B)software
C)usernames
D)keywords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____ occurs when someone reproduces and distributes copyright protected work without obtaining permission from-or providing compensation to-the owner of the material.

A)Hacking
B)Contract cheating
C)Identity theft
D)Piracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Recently, Candice found it difficult to find legitimate email messages due to the hundreds of unsolicited commercial emails in her inbox. To prevent this from occurring in the future, Candice should install a _____.

A)spam filter
B)cyber net filter
C)pharming filter
D)spyware program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ are best described as specialized Internet sites, which provide a platform to interact for businesses, specifically those involved in business-to-business (B2B)transactions.

A)Social networking sites
B)E-marketplaces
C)Blogs
D)I-commerce sites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
In the _____ form of e-commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.

A)business-to-government
B)business-to-consumer
C)business-to-business
D)consumer-to-consumer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard for the users' interest in the product or its promotion.

A)Cyberware
B)Spam
C)Opt-in email
D)Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
_____ is software that installs itself on a computer without permission and then tracks its behavior in some way.

A)Adware
B)Screenware
C)Freeware
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?​

A)Computer worms
B) Computer viruses​
C)Freewares
D)Spywares
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Enterprise content management
D)Social commerce
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ is a technology that stores information on a microchip-such as a unique serial number-and transmits it to a reader when it is within range.

A)Global positioning system
B)Computer-aided design
C)Graphical user interface
D)Radio frequency identification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n)_____ is similar to a virus, except that it is an independent program that can be spread across computer networks without being attached to other files.

A)worm
B)spam program
C)spyware
D)adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following statements is true of business-to-business (B2B)e-commerce?

A)It involves much less negotiation than business-to-consumer (B2C) e-commerce.
B)It involves businesses selling supplies, components, machinery, equipment, or services to individual final consumers.
C)It involves much less investment than business-to-consumer (B2C) e-commerce.
D)It involves businesses selling supplies, components, machinery, equipment, or services to other businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
_____ is best described as an Internet advertising strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.

A)Phishing
B)Supply-chaining
C)E-tailing
D)Viral marketing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The approach to make e-commerce sites more interactive and collaborative, with customers providing most of the content, as well as a richer, more interesting, and more useful experience is known as _____.

A)Web 2.0
B)Internet5
C)Internet2
D)Web 2.2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
When a person buys stocks through an online broker such as Charles Schwab, he or she participates in _____ e-commerce.

A)business-to-business
B)business-to-government
C)business-to-consumer
D)consumer-to-consumer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n)_____ is a decision support system that helps managers make better decisions in an area where they lack sufficient knowledge.

A)expert system
B)data mine
C)graphical user interface
D)utility system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n)_____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)decision support system
B)intranet
C)cybermediary
D)expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____ are files of related facts and figures organized according to a logical system and stored on hard drives or some other computer-accessible storage media.

A) Extranets
B) Databases
C)Intranets
D)Data mines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
In _____ e-commerce, many purchases may be based on impulse.

A)business-to-business
B)business-to-consumer
C)business-to-government
D)consumer-to-business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the purpose of system software? Describe operating systems and utility programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
_________ refers to the programs that provide instructions to a computer so that it can perform a desired task.

A)Hardware
B)Software
C)Intranet
D)Extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the benefits of cloud computing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ give managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)Decision support systems
B)Extranets
C)Intranets
D)System software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List and describe the ethical and legal challenges that information technology raises.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
_________ are skilled computer users who have the expertise to gain unauthorized access to other people's computers.

A)Phishers
B)Spammers
C)Pirates
D)Hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss four advantages that businesses using e-marketplaces enjoy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
A _________ is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)spyware
C)query
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Compare and contrast intranets and extranets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
A(n)_________ is an Internet-based firm that specializes in the secure electronic transfer of funds.

A)firewall
B)data warehouse
C)cybermediary
D)extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.