Chapter 14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Computer network

Group of two or more computers linked together by some form of cabling or buy wireless technology to share data or resources, such as a printer

computer-aided manufacturing (CAM)

IS that uses computers to design and control equipment in a manufacturing process

computer-aided design (CAD)

IS with software that helps knowledge workers design products by stimulating them and displaying them in three dimensional graphics

Electric conferencing

ITThat allows groups of people to communicate stimulus Lee from various locations via e-mai, phone, or video

The fraudulent acquisition and use of another person's private and personal information, usually for financial gain, is known as _______.

Identity theft

Knowledge information system

Information system that supports knowledge workers by providing resources to create, store, shoes, and transmit new knowledge for useful applications

Decision support system

Interactive system to create virtual business models for a particular kind of decision and tests them with different data to see how they respond

Information, Inc. employees can access all sorts of company information from their computers, including production data, product design details, marketing activities, and even Company benefits. Only employees and those suppliers that are granted special access can view this information. What BEST describes Information, Inc.'s system?

Intranet

How does technology create more efficient organizations?

It allows companies to employ fewer people

How is data conferencing used?

It allows people to remote locations to work on a document at the same time

Spam

Junk email sent to a mailing list or news group

Viruses, worms, Trojan horses, and other infectious software are known as ________.

Malware

Evergrow has just purchased a company in Canada, and is not working to interrogate the Canadian system with the US based system. These systems include areas such as cash flow, sales, production scheduling, and shipping. Which of the following systems will help Evergrow better interrogate the newly acquired facility with existing ones?

Management information system (MIS)

What allows companies to produce in large quantities while still providing their customers the opportunity to select individual features and options?

Mass customization

Information

Meaningful, useful interpretations of data

VSAT Satellite Communications

Network of geographically dispersed transmitter-recievers (transceivers) that send signals to and receive signals from a satellite, exchanging voice, video, and data transmissions

Identity theft

On authorized use of personal information (such as Social Security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim

Intranet

Organization's private network of internally linked websites accessible only to employees

Danielle receives an email, supposably from the college, telling her that her email account has exceeded its mail quota on their server database and their account will become inactive in 24- 28 hours unless she clicks on a link and to verify her account by providing her password and student ID number. This is likely an example of _______.

Phishing

If you receive an email asking for your banking information or social security number, check out the website carefully. Someone is likely trying to get your personal information in order to empty your bank account. What is this King known as?

Phishing

Hardware

Physical components of a computer network, such as keyboards, monitors, system units, and printers

Mass customization

Principle in which companies produce in large volumes, but each item features the unique option the customer prefers

Anti-virus software

Product that protects systems by searching incoming emails and data files for "signatures" of known viruses and viruses-like-characteristics

Spyware

Program unknowinglyprogram unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system

Software

Programs that tell the computer how to function, what resources to use, how to use them, and application programs for specific activities

Intellectual property

Property created through a persons creative activities

Data

Raw facts and figures that, by themselves, may not have much meaning

Firewall

Security system with special software or hardware device is designed to keep computers safe from hackers

Encryption system

Software that assigns an email message to a unique code number (digital fingerprint) or each computer so only that computer, not others, can open and read the message

Unwanted email messages that include advertising or inappropriate content are known as ______.

Spam

In creating a company based on mass customization, which of the following would be the greatest barrier?

Standardized assembly line

Extranet

System that allows outsiders linked access to a firms internal information network

Information system (IS)

System that uses IT resources to come for data into information and to collect, process and to transmit that information for use in decision making

Wi-Fi

Technology using a wireless local area network

E-commerce

Use of the Internet and other electric means for retailing and business to business transactions

Information Technology (IT)

Various appliances and devices for creating, storing, exchanging, and using information in diverse models,Including visual images, voice, multimedia, and business data

Terrific Technology has linked all of its computers throughout the United States. What is Terrific Technology using to accomplish this?

Wide area network (WAN)

using another person's private but unsecured wireless network without their permission or knowledge is known as_________.

Wireless mooching

Which of the following can travel through a computer network against spread infection files without you having to open any software?

Worm

Using a file sharing service, your sister just gave you copies of 14,000 songs she copied from CDs she owns. This is probably _______.

a copyright violation

A security system that protects computers from hackers is known as _____.

a firewall

Which of the following is the BEST definition of e-commerce? the use of the internet and other electronic means for retailing and _____.

business-to-business transactions

Which of the following is used to create Precision drawings, technical illustrations, and two or three-dimensional models of products in the design stage?

computer-aided design (CAD)

Wide Area Network (WAN)

computers that are linked over long distances through telephone lines, microwave signals, or satellite communications

A chain of grocery stores analyzes the buying patterns of its customers using data collected on customers Loyalty cards and uses this information to send e-coupons two customers that Target the purchases they have made over the past 90 days. This is an example of ________.

data mining

During an interview, Jane was asked for her Facebook username and password. Caught off guard, the chain provided the information. When she had a chance to think about this, Jane decided this was an invasion of her privacy and she was not interested in working with companies that seek this type of information. Yet, companies have a right to ask and can often get this information. What type of issue has been created for Jane and the organization Where She interviewed because of IT anthem potential consequences of using IT yes I do?

ethical concerns

Internet

gigantic system of interconnected computer networks linked together by voice, electronic, and wireless technologies

Wireless local area network (wireless LAN or WLAN)

local area network with wireless access points for PC users

Information systems managers

managers who are responsible for the systems used for gathering, organizing, and distributing information

Zazzles high-volume online retailer that allows users to upload images and create their own personalized items, from getting cards to clothing to iPhone cases. Users can choose Premier Designs for design products from scratch, as well as pick their favorite colors and styles. This is an example of ______.

mass customisation

Wireless Wide Area Network (WWAN)

network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances

The IT director of your company has identified three boxes of credit reports and other customer data that have been marked as expired and ready of disposal. She should ________.

shred the documents

Hackers use phishing, pharming, spyware, or spanning to collect personal information to ______.

steal their targets identity for monetary gain

Data Mining

the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information

Data warehousing

the collection, storage, and retrieval of data in electronic files

What BEST describes a "client" in a client server Network?

A laptop or desktop computer used to request information

"Super Wi-Fi Network

A powerful Wi-Fi network with extensive research and strong signals that flow freely through physical objects such as walls

which of the following protects a computer run against hackers by searching incoming email and looking for dangers?

Anti-virus software

World Wide Web

Branch of the Internet consisting of interlinked hypertext documents, or web pages

Java Jones, the local coffee shop, was the first in the community to sell Fair Trade coffee and teas, allowing them to build a strong clientele in the community.Recently, some competition has introduced fair trade items, luring some customers away. The manager in Chapel Jones wants to encourage local business people to visit the coffee shop and even host small group meetings there. What should the manager at Chapa Jones add to entice businesspeople to me at Java Jones?

Cloud computing

Client-server network

Common business network in which clients make request for information or resources and servers provide the services

Hypertext Transfer Protocol (HTTP)

Communications protocol used for the World Wide Web, in which related prices of information on separate web pages are connected using hyperlinks

Management information system(MIS)

Computer system that supports managers by providing information-reports, schedules, plans, and budgets-that can be used for making decisions

Mitchell used to be required to leave the cool, air-conditioned plant control room to add chemicals to the process every hour or so. Now he has the chemicals using a machine on the plant floor, with just a push of a couple of buttons on his computer without leaving his chair! what has provided Michelle with this advantage?

Computer- aided Manufacturing (CAM)

Our company just purchased a system that allows us to design new products through a stimulation and show these products in 3D Graphics. What type of system did we purchase?

Computer-aided design (CAD)

Grant IndustriesInvested in a sophisticated system that uses computer software and Machinery to automate its manufacturing process, helping it to increase production, consistency, and tooling accuracy. This is an example of _______.

Computer-aided manufacturing (CAD)

Local Area Network (LAN)

Computers that are linked in a small area, such as all of a firms computers within a single building

Hacker

Cyber criminal Hawkins authorized access to a computer or network, either to steal information, money or property or to tamper with data

Always Analyzing, Inc. has gathered a great deal of information and now needs to make sense of the data. What would help Always Analyze to organize information in a useful way?

Data mining

you have been given a detailed IT report of sales by division, by product, and by covering a span of five years. You have been asked to report a back on seasonal Trends in order to help management and implement a more efficient Supply Chain management and inventory system. This is an example of converting _________ into _________.

Data; information

Marcus would like to increase the capacity of his production line. Before he makes any investment, he would like to know what it would cost to operate at a higher capacity, how much product he would have to sell, and other information to help him decide if this is a good idea. What would help Marcus make this decision?

Decision support system (DSS)

Hypertext transfer protocol is used to connect which of the following?

Documents or Web pages on the World Wide Web

Jason uses the internet to sell his products to customers. They can view all the design options, choose colors, order, and pay online. Jason is participating in _______.

E-commerce

the process of changing text so that it is no longer easy to read to anyone without the translation key or code is known as ________.

Encryption

Totally Technical, Inc. utilizes a system wearing only the intended recipient can open an email. If someone else tries to open the email, all he or she will see is a bunch of letters and numbers that don't make any sense. What is Totally Technical using?

Encryption system

Your company is considering switching from a client server based accounting system to a cloud-based system which of the following would be the best advantage of such a switch?

Enhanced user flexibility

What allows a manager to check on the status of an order, analyze delivery performance, review productivity status, and manage company activities using real-time information?

Enterprise resource planning (ERP)

_______ is used by a firm to organize and manage activities ( such as manufacturing, purchasing, sales, and delivery) cross all product lines and even Geographic activities.

Enterprise resource planning (ERP)

Jonah bought a new grill and have difficulty assembling it. She was able to download a more detailed user manual from the manufacturer's website through use of its _____.

Extranet

Part of a computer system or network that is designed to block unauthorized access while still permitting communication is known as a(n) ______.

Firewall

which of the following would a company use in order to prevent hackers or other unauthorized outsiders from accessing information on his computer network?

Firewall


Ensembles d'études connexes

1.3 WRITE FULL SENTENCES. USE is/isn't/are/aren't

View Set

Lesson 4: Areas of Parallelograms, Trapezoids, and Triangles CE 2015 Math 6 B Unit 3: Geometry and Measurement

View Set

Introduction to Social Media Final Exam Study Guide

View Set

GRADE 8 - HISTORY - THE BUBONIC PLAGUE - TEST 4

View Set

Chapter 10, 11, 12, 13, 14 Reading test

View Set

Sports Final- SBJ & Guest Speakers

View Set

Saunders Respiratory Medication Questions

View Set