Ch 14: information technology (IT) for business
Computer-aided design (CAD) ___________.
Helps knowledge workers design products by stimulating them and displaying them in 3D graphics.
Software that assigns an email message to a unique code number (digital footprint) for each computers to only that computer, not others, can open and read the message best defines _____________.
An encryption system
____________ system allows outsiders limited access to a firm's internal information network.
An extranet
____________ is a security systems with special software or hardware devices designed to keep computers safe from hackers.
A firewall
What is VSAT satellite communication?
A network of geographically dispersed transmitter receivers that send signals to and receive signals from satellites, exchanging voice, video, and data transmissions.
Which of the following is the definition of a wireless wide area network (WWAN)?
A network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances
Antivirus software is ____________.
A product that protects systems by searching incoming emails and data files for signatures of known viruses and virus-like characteristics
Which of the following best defines spyware?
A program unknowingly downloaded by users by things such as free software that, once installed, crawls around to monitor the host's computer activities
A network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances best defines ____________.
A wireless wide area network
__________ is an organization's private network of internally linked websites accessible only to employees.
An intranet
Which of the following best defines denial of service?
Attacks that flood networks or websites with bogus requests for information and resources, thereby overloading and shutting the networks or websites down, preventing legitimate users from accessing them
The World Wide Web is a(n) _____________.
Branch of the internet consisting of interlinked hypertext documents, or web pages
__________ make(s) up a wide area network.
Computers that are linked over long distances through long-distance telephone wires, microwave signals, or satellite communications.
The Internet has spawned a number of business communications technologies, including _______________, which is information technology that allows groups of people to communicate simultaneously from various locations via e-mail, phone, or video.
Electronic conferencing
Phishing is ___________.
Schemes that lure internet users to bogus websites
Junk email sent to a mailing list best defines _______________.
Spam
Which of the following is the definition of data mining?
The application of electronic technologies for searching, sifting, and reorganizing pools to uncover useful information
Data warehousing is _____________.
The collection, storage, and retrieval of data in electronic files.
_____________ is a gigantic system of interconnected computer networks linked by voice, electronic, and wireless technologies.
The internet
Information systems _______________.
Use IT resources that enable managers to take data, raw factors, and figures that, by themselves, may not have much meaning, and turn those data into information
Computers that are linked over long distances through long-distance telephone wires, microwave signals, or satellite communications make up ______________ networks.
Wide area
Software is best defined as ___________.
programs that tell the computer how to function, what resources to use, and how to use them, and applications programs for specific activites.