Chapter 14
Computer network
Group of two or more computers linked together by some form of cabling or buy wireless technology to share data or resources, such as a printer
computer-aided manufacturing (CAM)
IS that uses computers to design and control equipment in a manufacturing process
computer-aided design (CAD)
IS with software that helps knowledge workers design products by stimulating them and displaying them in three dimensional graphics
Electric conferencing
ITThat allows groups of people to communicate stimulus Lee from various locations via e-mai, phone, or video
The fraudulent acquisition and use of another person's private and personal information, usually for financial gain, is known as _______.
Identity theft
Knowledge information system
Information system that supports knowledge workers by providing resources to create, store, shoes, and transmit new knowledge for useful applications
Decision support system
Interactive system to create virtual business models for a particular kind of decision and tests them with different data to see how they respond
Information, Inc. employees can access all sorts of company information from their computers, including production data, product design details, marketing activities, and even Company benefits. Only employees and those suppliers that are granted special access can view this information. What BEST describes Information, Inc.'s system?
Intranet
How does technology create more efficient organizations?
It allows companies to employ fewer people
How is data conferencing used?
It allows people to remote locations to work on a document at the same time
Spam
Junk email sent to a mailing list or news group
Viruses, worms, Trojan horses, and other infectious software are known as ________.
Malware
Evergrow has just purchased a company in Canada, and is not working to interrogate the Canadian system with the US based system. These systems include areas such as cash flow, sales, production scheduling, and shipping. Which of the following systems will help Evergrow better interrogate the newly acquired facility with existing ones?
Management information system (MIS)
What allows companies to produce in large quantities while still providing their customers the opportunity to select individual features and options?
Mass customization
Information
Meaningful, useful interpretations of data
VSAT Satellite Communications
Network of geographically dispersed transmitter-recievers (transceivers) that send signals to and receive signals from a satellite, exchanging voice, video, and data transmissions
Identity theft
On authorized use of personal information (such as Social Security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim
Intranet
Organization's private network of internally linked websites accessible only to employees
Danielle receives an email, supposably from the college, telling her that her email account has exceeded its mail quota on their server database and their account will become inactive in 24- 28 hours unless she clicks on a link and to verify her account by providing her password and student ID number. This is likely an example of _______.
Phishing
If you receive an email asking for your banking information or social security number, check out the website carefully. Someone is likely trying to get your personal information in order to empty your bank account. What is this King known as?
Phishing
Hardware
Physical components of a computer network, such as keyboards, monitors, system units, and printers
Mass customization
Principle in which companies produce in large volumes, but each item features the unique option the customer prefers
Anti-virus software
Product that protects systems by searching incoming emails and data files for "signatures" of known viruses and viruses-like-characteristics
Spyware
Program unknowinglyprogram unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system
Software
Programs that tell the computer how to function, what resources to use, how to use them, and application programs for specific activities
Intellectual property
Property created through a persons creative activities
Data
Raw facts and figures that, by themselves, may not have much meaning
Firewall
Security system with special software or hardware device is designed to keep computers safe from hackers
Encryption system
Software that assigns an email message to a unique code number (digital fingerprint) or each computer so only that computer, not others, can open and read the message
Unwanted email messages that include advertising or inappropriate content are known as ______.
Spam
In creating a company based on mass customization, which of the following would be the greatest barrier?
Standardized assembly line
Extranet
System that allows outsiders linked access to a firms internal information network
Information system (IS)
System that uses IT resources to come for data into information and to collect, process and to transmit that information for use in decision making
Wi-Fi
Technology using a wireless local area network
E-commerce
Use of the Internet and other electric means for retailing and business to business transactions
Information Technology (IT)
Various appliances and devices for creating, storing, exchanging, and using information in diverse models,Including visual images, voice, multimedia, and business data
Terrific Technology has linked all of its computers throughout the United States. What is Terrific Technology using to accomplish this?
Wide area network (WAN)
using another person's private but unsecured wireless network without their permission or knowledge is known as_________.
Wireless mooching
Which of the following can travel through a computer network against spread infection files without you having to open any software?
Worm
Using a file sharing service, your sister just gave you copies of 14,000 songs she copied from CDs she owns. This is probably _______.
a copyright violation
A security system that protects computers from hackers is known as _____.
a firewall
Which of the following is the BEST definition of e-commerce? the use of the internet and other electronic means for retailing and _____.
business-to-business transactions
Which of the following is used to create Precision drawings, technical illustrations, and two or three-dimensional models of products in the design stage?
computer-aided design (CAD)
Wide Area Network (WAN)
computers that are linked over long distances through telephone lines, microwave signals, or satellite communications
A chain of grocery stores analyzes the buying patterns of its customers using data collected on customers Loyalty cards and uses this information to send e-coupons two customers that Target the purchases they have made over the past 90 days. This is an example of ________.
data mining
During an interview, Jane was asked for her Facebook username and password. Caught off guard, the chain provided the information. When she had a chance to think about this, Jane decided this was an invasion of her privacy and she was not interested in working with companies that seek this type of information. Yet, companies have a right to ask and can often get this information. What type of issue has been created for Jane and the organization Where She interviewed because of IT anthem potential consequences of using IT yes I do?
ethical concerns
Internet
gigantic system of interconnected computer networks linked together by voice, electronic, and wireless technologies
Wireless local area network (wireless LAN or WLAN)
local area network with wireless access points for PC users
Information systems managers
managers who are responsible for the systems used for gathering, organizing, and distributing information
Zazzles high-volume online retailer that allows users to upload images and create their own personalized items, from getting cards to clothing to iPhone cases. Users can choose Premier Designs for design products from scratch, as well as pick their favorite colors and styles. This is an example of ______.
mass customisation
Wireless Wide Area Network (WWAN)
network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances
The IT director of your company has identified three boxes of credit reports and other customer data that have been marked as expired and ready of disposal. She should ________.
shred the documents
Hackers use phishing, pharming, spyware, or spanning to collect personal information to ______.
steal their targets identity for monetary gain
Data Mining
the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information
Data warehousing
the collection, storage, and retrieval of data in electronic files
What BEST describes a "client" in a client server Network?
A laptop or desktop computer used to request information
"Super Wi-Fi Network
A powerful Wi-Fi network with extensive research and strong signals that flow freely through physical objects such as walls
which of the following protects a computer run against hackers by searching incoming email and looking for dangers?
Anti-virus software
World Wide Web
Branch of the Internet consisting of interlinked hypertext documents, or web pages
Java Jones, the local coffee shop, was the first in the community to sell Fair Trade coffee and teas, allowing them to build a strong clientele in the community.Recently, some competition has introduced fair trade items, luring some customers away. The manager in Chapel Jones wants to encourage local business people to visit the coffee shop and even host small group meetings there. What should the manager at Chapa Jones add to entice businesspeople to me at Java Jones?
Cloud computing
Client-server network
Common business network in which clients make request for information or resources and servers provide the services
Hypertext Transfer Protocol (HTTP)
Communications protocol used for the World Wide Web, in which related prices of information on separate web pages are connected using hyperlinks
Management information system(MIS)
Computer system that supports managers by providing information-reports, schedules, plans, and budgets-that can be used for making decisions
Mitchell used to be required to leave the cool, air-conditioned plant control room to add chemicals to the process every hour or so. Now he has the chemicals using a machine on the plant floor, with just a push of a couple of buttons on his computer without leaving his chair! what has provided Michelle with this advantage?
Computer- aided Manufacturing (CAM)
Our company just purchased a system that allows us to design new products through a stimulation and show these products in 3D Graphics. What type of system did we purchase?
Computer-aided design (CAD)
Grant IndustriesInvested in a sophisticated system that uses computer software and Machinery to automate its manufacturing process, helping it to increase production, consistency, and tooling accuracy. This is an example of _______.
Computer-aided manufacturing (CAD)
Local Area Network (LAN)
Computers that are linked in a small area, such as all of a firms computers within a single building
Hacker
Cyber criminal Hawkins authorized access to a computer or network, either to steal information, money or property or to tamper with data
Always Analyzing, Inc. has gathered a great deal of information and now needs to make sense of the data. What would help Always Analyze to organize information in a useful way?
Data mining
you have been given a detailed IT report of sales by division, by product, and by covering a span of five years. You have been asked to report a back on seasonal Trends in order to help management and implement a more efficient Supply Chain management and inventory system. This is an example of converting _________ into _________.
Data; information
Marcus would like to increase the capacity of his production line. Before he makes any investment, he would like to know what it would cost to operate at a higher capacity, how much product he would have to sell, and other information to help him decide if this is a good idea. What would help Marcus make this decision?
Decision support system (DSS)
Hypertext transfer protocol is used to connect which of the following?
Documents or Web pages on the World Wide Web
Jason uses the internet to sell his products to customers. They can view all the design options, choose colors, order, and pay online. Jason is participating in _______.
E-commerce
the process of changing text so that it is no longer easy to read to anyone without the translation key or code is known as ________.
Encryption
Totally Technical, Inc. utilizes a system wearing only the intended recipient can open an email. If someone else tries to open the email, all he or she will see is a bunch of letters and numbers that don't make any sense. What is Totally Technical using?
Encryption system
Your company is considering switching from a client server based accounting system to a cloud-based system which of the following would be the best advantage of such a switch?
Enhanced user flexibility
What allows a manager to check on the status of an order, analyze delivery performance, review productivity status, and manage company activities using real-time information?
Enterprise resource planning (ERP)
_______ is used by a firm to organize and manage activities ( such as manufacturing, purchasing, sales, and delivery) cross all product lines and even Geographic activities.
Enterprise resource planning (ERP)
Jonah bought a new grill and have difficulty assembling it. She was able to download a more detailed user manual from the manufacturer's website through use of its _____.
Extranet
Part of a computer system or network that is designed to block unauthorized access while still permitting communication is known as a(n) ______.
Firewall
which of the following would a company use in order to prevent hackers or other unauthorized outsiders from accessing information on his computer network?
Firewall