Deck 14: Using Technology to Manage Information

ملء الشاشة (f)
exit full mode
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an executive responsible for managing a firm's information system and related computer technologies.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.
سؤال
Define databases and describe how they are obtained and their uses.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consist of raw facts and figures that may or may not be relevant to business decisions.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is a computer program that imitates human thinking through complicated sets of if-then rules.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ uses powerful servers to store applications software and databases for users to access via the Web.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n) _____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n) _____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n) _____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n) _____.
سؤال
Explain the difference between data and information.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n) _____.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
سؤال
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
سؤال
A database can best be described as ________.

A) data that has been converted into information
B) data gathered at random from a variety of sources
C) a centralized integrated collection of an organization's data resources
D) a loose collection of ideas
سؤال
Which of the following is considered information rather than data?

A) projected population growth in a target market
B) a measure of the effectiveness of a promotional strategy
C) income distribution in a target market
D) product sales in various categories
سؤال
Identify four significant trends regarding information systems.
سؤال
Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the firm's ________ system.

A) executive information
B) decision support
C) database management
D) enterprise resource planning
سؤال
Hannah is a television executive whose team conducted demographic research for new programs. Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A) data
B) groupware
C) database
D) information
سؤال
Describe a wide area network and explain how companies use it.
سؤال
Explain the differences between a virus, a worm, and a Trojan horse.
سؤال
Which of the following statements best describes the purpose of a management information system?

A) It assists the human resources department with research on employee benefit costs.
B) It provides management with feedback from sales meetings.
C) It provides information on internal operations and external intelligence for use in decision making.
D) It assists the accounting department with budget information.
سؤال
Bridgette, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Bridgette uses a(n) ________.

A) enterprise planning resources
B) executive support system
C) expert system
D) decision support system
سؤال
Provide the five important tasks for off-site data storage.
سؤال
Describe at least two ways in which common cybercrimes occur.
سؤال
Describe two tips for communication etiquette for using wireless devices.
سؤال
One of the largest online databases is owned by ________.

A) IBM
B) the U.S. Census Bureau
C) the Federal Trade Commission (FTC)
D) Microsoft
سؤال
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n) _____.

A) decision support system
B) expert system
C) executive information system
D) database management system
سؤال
Provide examples of ethical concerns regarding information technology and information systems.
سؤال
Explain the difference between hardware and software. Give examples of both.
سؤال
The person who directs a firm's management information systems and related computer operations is often called the ________.

A) financial advisor
B) chief information officer
C) executive information manager
D) chief executive officer
سؤال
List and briefly explain the most widely used applications of computers.
سؤال
Brandon is trying to close a particularly difficult sale. He uses his PDA (personal digital assistant) and a special program to access information within his company's database on pricing. Brandon is using an ________.

A) expert system
B) enterprise resource planning system
C) executive support system
D) application service provider
سؤال
Raw facts and figures are _____.

A) data
B) information
C) a management information system
D) a decision support system
سؤال
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A) hand held device
B) personal computer
C) mainframe computer
D) midrange system
سؤال
Which of the following is the most recent development in laptop computers?

A) PDA
B) tablet PC
C) minicomputer
D) netbook
سؤال
James is putting together a presentation for senior management analyzing a potential new market. He is using his computer to create charts and graphs that he will then show as slides. Which of the following software programs is James most likely using?

A) Microsoft Word
B) Microsoft Excel
C) Microsoft Windows
D) Microsoft PowerPoint
سؤال
All of the following devices are computer hardware EXCEPT a ________.

A) monitor
B) printer driver
C) fax machine
D) mouse
سؤال
Which of the following is an application program?

A) Unix
B) Java
C) Microsoft Windows
D) Microsoft Excel
سؤال
________ tie geographical regions together using long-distance telephone lines or satellite transmissions.

A) Local area networks
B) Executive information systems
C) Database systems
D) Wide area networks
سؤال
Which of the following is a storage device?

A) thumb drive
B) modem
C) CRT monitor
D) scanner
سؤال
Margaret would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares, territories, and projected sales. In order to achieve maximum impact, Margaret should communicate her information to the company's senior executives using a ________.

A) staging software
B) desktop publishing
C) presentation software
D) production software
سؤال
Which of the following is a reason for the increasing popularity of notebook computers?

A) more computing capacity than midrange systems
B) limited displays
C) faster processing speeds
D) higher prices
سؤال
All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n) ________.

A) wide area network
B) enterprise resource system
C) expert system
D) local area network
سؤال
The software which controls the basic workings of the computer system is called a(n) _____.

A) expert
B) executive information system
C) database
D) operating system
سؤال
An expert system would most likely be used to ________.

A) retrieve sales data
B) determine the status of a customer's order
C) determine the optimal layout of a plant
D) access relevant data from the company's database
سؤال
Amelia is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Amelia is probably using a ________ program.

A) spreadsheet
B) presentation
C) word processor
D) desktop publishing
سؤال
Jose purchases a new game for his computer. He loads the program onto the computer's hard drive. Jose has purchased a(n) ________.

A) output device
B) processing device
C) application software
D) operating system
سؤال
A program that performs specific tasks that the user wants to carry out is called ________.

A) financial software
B) the operating system
C) a management information system
D) application software
سؤال
Electronic spreadsheets ________.

A) are special software used to create graphics
B) can replace managerial judgment in decision making
C) are used for numerical and statistical data
D) are very difficult to use
سؤال
Brian works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Brian is using a(n) ________.

A) expert system
B) enterprise resource planning system
C) decision support system
D) information interface
سؤال
Bill is sitting at his computer preparing a new sales brochure. The brochure combines high-quality type, graphics, and photographs. What type of software is Bill likely using to create the brochure?

A) word processing program
B) desktop publishing program
C) presentation graphics program
D) spreadsheet program
سؤال
On Zaxen.com, homebuyers enter information regarding their preferred home location, price, and features. Using an ________, the website automatically displays real estate properties that match the homebuyer's criteria.

A) executive information system
B) encryption
C) application service provider
D) expert system
سؤال
A computer program that imitates human thinking is a(n) ________.

A) information interface
B) decision support system
C) enterprise resource planning system
D) expert system
سؤال
Sylvia belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.

A) cloud program
B) software application
C) Trojan horse
D) network firewall
سؤال
Alberto purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, Alberto established a(n) ________ to create company bulletin boards, share documents, and conduct online conference.

A) extranet
B) intranet
C) botnet
D) Internet
سؤال
Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called ________.

A) disaster recovery planning
B) information systems management
C) advanced computer security
D) virus protection
سؤال
Salvador downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n) ________.

A) malfunctioning computer
B) intranet failure
C) computer virus
D) bad operating system
سؤال
Unlike Wi-Fi 's relatively limited geographic coverage area, generally around 300 feet, a single _____ access point can provide coverage over many miles.

A) intranet
B) VPN
C) Wi-Max
D) VoIP
سؤال
Jose's company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Jose's company has installed a(n) ________.

A) virtual private network
B) wide area network
C) intranet
D) extranet
سؤال
Broxton, an information technology manager at Baron Inc., needs intranet in the new building that the company has purchased. Instead of spending money on wired network, Broxton decides that he will use a wireless intranet service. He needs intranet around 300-feet radius. Broxton can provide wireless intranet using _____ in the building.

A) botnet
B) Wi-Fi
C) Wi-Max
D) VoiP
سؤال
All of the following are advantages of VoIP, EXCEPT ________.

A) increased flexibility
B) increased security
C) lower cost
D) additional features
سؤال
Data alone are of limited value to a company.
سؤال
Rebecca is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Rebecca's company has a(n) ________.

A) internet
B) botnet
C) intranet
D) extranet
سؤال
Ramon, a software engineer at Frensen Inc., needs to develop high-quality graphic illustrations for presentation at his next team meeting. In the context of application software, he must use _____ software to accomplish this.

A) desktop publishing
B) spreadsheet
C) database
D) word processing
سؤال
Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer's browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a _____.

A) worm
B) botnet
C) spyware
D) bug
سؤال
Which of the following statements is true about intranets?

A) Intranets require a Windows operation system.
B) Intranets can be accessed by anyone with an Internet connection.
C) Intranets provide secure connections between two points on the Internet.
D) Intranets allow information sharing within a company network.
سؤال
An outside supplier used for providing computer and program support for managing an information system is known as ________.

A) an application service provider
B) an application maintenance provider
C) utility maintenance provider
D) on-demand service provider
سؤال
Which of the following is an unreasonable response to potential computer problems?

A) using online storage services
B) limiting computer access to only a handful of senior managers
C) installing extra hardware in a secure location
D) routinely backing up software and data
سؤال
A program that attaches itself to other programs and changes programs or destroys data is a(n) ________.

A) computer virus
B) purge program
C) inoculation program
D) operational program
سؤال
Isabelle's office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Isabelle took no chances and implemented ________, in which she backed up her data in a secure online storage service.

A) enterprise resource planning
B) firewall
C) encryption
D) disaster recovery planning
سؤال
Sales figures are an example of data.
سؤال
Jenny, a computer science student at Canyon University, purchases a new computer for her software programming needs. She must install _____ on her computer to make it work.

A) Linux
B) Adobe InDesign
C) Intuit QuickBooks
D) Quicken
سؤال
Brandon, a software engineer at Texotel Inc., finds that his company's current systems have relatively lower capacity to handle computing needs of the company. Texotel is a medium-sized company. In this context, Brandon must use _____ to create a virtual mainframe to solve this computing need.

A) cloud computing
B) grid computing
C) distributed computing
D) on-demand computing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/117
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.
i
2
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an executive responsible for managing a firm's information system and related computer technologies.
a
3
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.
c
4
Define databases and describe how they are obtained and their uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
5
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consist of raw facts and figures that may or may not be relevant to business decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
6
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is a computer program that imitates human thinking through complicated sets of if-then rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
7
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
8
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ uses powerful servers to store applications software and databases for users to access via the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
9
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
10
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
11
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
12
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
13
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
14
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
15
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
16
Explain the difference between data and information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
17
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
18
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
19
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
20
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
21
A database can best be described as ________.

A) data that has been converted into information
B) data gathered at random from a variety of sources
C) a centralized integrated collection of an organization's data resources
D) a loose collection of ideas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is considered information rather than data?

A) projected population growth in a target market
B) a measure of the effectiveness of a promotional strategy
C) income distribution in a target market
D) product sales in various categories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
23
Identify four significant trends regarding information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
24
Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the firm's ________ system.

A) executive information
B) decision support
C) database management
D) enterprise resource planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
25
Hannah is a television executive whose team conducted demographic research for new programs. Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A) data
B) groupware
C) database
D) information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe a wide area network and explain how companies use it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
27
Explain the differences between a virus, a worm, and a Trojan horse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following statements best describes the purpose of a management information system?

A) It assists the human resources department with research on employee benefit costs.
B) It provides management with feedback from sales meetings.
C) It provides information on internal operations and external intelligence for use in decision making.
D) It assists the accounting department with budget information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
29
Bridgette, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Bridgette uses a(n) ________.

A) enterprise planning resources
B) executive support system
C) expert system
D) decision support system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
30
Provide the five important tasks for off-site data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe at least two ways in which common cybercrimes occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe two tips for communication etiquette for using wireless devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
33
One of the largest online databases is owned by ________.

A) IBM
B) the U.S. Census Bureau
C) the Federal Trade Commission (FTC)
D) Microsoft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
34
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n) _____.

A) decision support system
B) expert system
C) executive information system
D) database management system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
35
Provide examples of ethical concerns regarding information technology and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
36
Explain the difference between hardware and software. Give examples of both.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
37
The person who directs a firm's management information systems and related computer operations is often called the ________.

A) financial advisor
B) chief information officer
C) executive information manager
D) chief executive officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
38
List and briefly explain the most widely used applications of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
39
Brandon is trying to close a particularly difficult sale. He uses his PDA (personal digital assistant) and a special program to access information within his company's database on pricing. Brandon is using an ________.

A) expert system
B) enterprise resource planning system
C) executive support system
D) application service provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
40
Raw facts and figures are _____.

A) data
B) information
C) a management information system
D) a decision support system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
41
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A) hand held device
B) personal computer
C) mainframe computer
D) midrange system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is the most recent development in laptop computers?

A) PDA
B) tablet PC
C) minicomputer
D) netbook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
43
James is putting together a presentation for senior management analyzing a potential new market. He is using his computer to create charts and graphs that he will then show as slides. Which of the following software programs is James most likely using?

A) Microsoft Word
B) Microsoft Excel
C) Microsoft Windows
D) Microsoft PowerPoint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
44
All of the following devices are computer hardware EXCEPT a ________.

A) monitor
B) printer driver
C) fax machine
D) mouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is an application program?

A) Unix
B) Java
C) Microsoft Windows
D) Microsoft Excel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ tie geographical regions together using long-distance telephone lines or satellite transmissions.

A) Local area networks
B) Executive information systems
C) Database systems
D) Wide area networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is a storage device?

A) thumb drive
B) modem
C) CRT monitor
D) scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
48
Margaret would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares, territories, and projected sales. In order to achieve maximum impact, Margaret should communicate her information to the company's senior executives using a ________.

A) staging software
B) desktop publishing
C) presentation software
D) production software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a reason for the increasing popularity of notebook computers?

A) more computing capacity than midrange systems
B) limited displays
C) faster processing speeds
D) higher prices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
50
All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n) ________.

A) wide area network
B) enterprise resource system
C) expert system
D) local area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
51
The software which controls the basic workings of the computer system is called a(n) _____.

A) expert
B) executive information system
C) database
D) operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
52
An expert system would most likely be used to ________.

A) retrieve sales data
B) determine the status of a customer's order
C) determine the optimal layout of a plant
D) access relevant data from the company's database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
53
Amelia is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Amelia is probably using a ________ program.

A) spreadsheet
B) presentation
C) word processor
D) desktop publishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
54
Jose purchases a new game for his computer. He loads the program onto the computer's hard drive. Jose has purchased a(n) ________.

A) output device
B) processing device
C) application software
D) operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
55
A program that performs specific tasks that the user wants to carry out is called ________.

A) financial software
B) the operating system
C) a management information system
D) application software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
56
Electronic spreadsheets ________.

A) are special software used to create graphics
B) can replace managerial judgment in decision making
C) are used for numerical and statistical data
D) are very difficult to use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
57
Brian works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Brian is using a(n) ________.

A) expert system
B) enterprise resource planning system
C) decision support system
D) information interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
58
Bill is sitting at his computer preparing a new sales brochure. The brochure combines high-quality type, graphics, and photographs. What type of software is Bill likely using to create the brochure?

A) word processing program
B) desktop publishing program
C) presentation graphics program
D) spreadsheet program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
59
On Zaxen.com, homebuyers enter information regarding their preferred home location, price, and features. Using an ________, the website automatically displays real estate properties that match the homebuyer's criteria.

A) executive information system
B) encryption
C) application service provider
D) expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
60
A computer program that imitates human thinking is a(n) ________.

A) information interface
B) decision support system
C) enterprise resource planning system
D) expert system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
61
Sylvia belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.

A) cloud program
B) software application
C) Trojan horse
D) network firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
62
Alberto purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, Alberto established a(n) ________ to create company bulletin boards, share documents, and conduct online conference.

A) extranet
B) intranet
C) botnet
D) Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
63
Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called ________.

A) disaster recovery planning
B) information systems management
C) advanced computer security
D) virus protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
64
Salvador downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n) ________.

A) malfunctioning computer
B) intranet failure
C) computer virus
D) bad operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
65
Unlike Wi-Fi 's relatively limited geographic coverage area, generally around 300 feet, a single _____ access point can provide coverage over many miles.

A) intranet
B) VPN
C) Wi-Max
D) VoIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
66
Jose's company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Jose's company has installed a(n) ________.

A) virtual private network
B) wide area network
C) intranet
D) extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
67
Broxton, an information technology manager at Baron Inc., needs intranet in the new building that the company has purchased. Instead of spending money on wired network, Broxton decides that he will use a wireless intranet service. He needs intranet around 300-feet radius. Broxton can provide wireless intranet using _____ in the building.

A) botnet
B) Wi-Fi
C) Wi-Max
D) VoiP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
68
All of the following are advantages of VoIP, EXCEPT ________.

A) increased flexibility
B) increased security
C) lower cost
D) additional features
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
69
Data alone are of limited value to a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
70
Rebecca is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Rebecca's company has a(n) ________.

A) internet
B) botnet
C) intranet
D) extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
71
Ramon, a software engineer at Frensen Inc., needs to develop high-quality graphic illustrations for presentation at his next team meeting. In the context of application software, he must use _____ software to accomplish this.

A) desktop publishing
B) spreadsheet
C) database
D) word processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
72
Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer's browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a _____.

A) worm
B) botnet
C) spyware
D) bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following statements is true about intranets?

A) Intranets require a Windows operation system.
B) Intranets can be accessed by anyone with an Internet connection.
C) Intranets provide secure connections between two points on the Internet.
D) Intranets allow information sharing within a company network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
74
An outside supplier used for providing computer and program support for managing an information system is known as ________.

A) an application service provider
B) an application maintenance provider
C) utility maintenance provider
D) on-demand service provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following is an unreasonable response to potential computer problems?

A) using online storage services
B) limiting computer access to only a handful of senior managers
C) installing extra hardware in a secure location
D) routinely backing up software and data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
76
A program that attaches itself to other programs and changes programs or destroys data is a(n) ________.

A) computer virus
B) purge program
C) inoculation program
D) operational program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
77
Isabelle's office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Isabelle took no chances and implemented ________, in which she backed up her data in a secure online storage service.

A) enterprise resource planning
B) firewall
C) encryption
D) disaster recovery planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
78
Sales figures are an example of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
79
Jenny, a computer science student at Canyon University, purchases a new computer for her software programming needs. She must install _____ on her computer to make it work.

A) Linux
B) Adobe InDesign
C) Intuit QuickBooks
D) Quicken
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
80
Brandon, a software engineer at Texotel Inc., finds that his company's current systems have relatively lower capacity to handle computing needs of the company. Texotel is a medium-sized company. In this context, Brandon must use _____ to create a virtual mainframe to solve this computing need.

A) cloud computing
B) grid computing
C) distributed computing
D) on-demand computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.