buss ch14
Which of the following BEST describes HTTP (hypertext transfer protocol)
a communications protocol used for the world wide web in which related pieces of info on seperate web pages are connected using hyperlinks
A security system that protects computers from hackers is known as _
a firewall
What BEST describes a "client" in a client-server network?
a laptop or desktop computer used to request info
What is VSAT satellite communication?
a network of geographically dispersed transmitter recievers that send signals to and recieve signals from satellite , exchanging voice, video and data transmissions
How is data conferencing used?
allows people in a remote location to work on a document at the same time
Which of the following BEST describes software that converts email messages into another form that cannot be easily understood by anyone except parties possessing the key to unscrambling them?
an encryption system
Which of the following protects a computer against hackers by searching incoming e-mail and looking for dangers?
anti virus software
Which of the following BEST describes a denial of service (DoS) attack?
attacks that flood networks or websites with bogus requests for info and recources , overloading and shutting the networks or websites down and preventing legitimite users from accessing them
ava Jones, the local coffee spot, was the first in the community to sell Fair Trade coffee and teas, allowing them to build a strong clientele in the community. Recently, some competition has introduced Fair Trade items, luring some customers away. The manager at Java Jones wants to encourage local businesspeople to visit the coffee shop and even host small group meetings there. What should the manager at Java Jones add to entice businesspeople to meet at Java Jones?
cloud computing
Our company just purchased a system that allows us to design new products through simulation and show these products in 3D graphics. What type of system did we purchase?
computer aided design
Grant Industries has invested in a sophisticated system that uses computer software and machinery to automate its manufacturing processes, helping it to increase production speeds, consistency, and tooling accuracy. This is an example of
computer aided manufacturing
Mitchell used to be required to leave the cool, air-conditioned plant control room to add chemicals to the process every hour or so. Now he adds the chemicals using a machine on the plant floor, with just a push of a couple of buttons on his computer without leaving his chair! What has provided Mitchell with this advantage?
computer aided manufacturing
What type of system could a manufacturer use to provide digital direction to a robot so the robot can move a product through the production process?
computer aided manufacturing
Which of the following BEST describes a wide area network?
computers linked over long distances through long distance telephone wires microwave signals or satelite communicatrions
Using a file-sharing service, your sister just gave you copies of 14,000 songs she copied from CDs she owns. This is probably ________.
copy right violation
what describes hackers
cybercrimminals who gain access to computer systems with the intention of incercepting or steeling data
You have been given a detailed IT report of sales by division, by product, and by day covering a span of five years. You have been asked to report back on seasonal trends in order to help management implement a more efficient supply chain management and inventory system. This is an example of converting _______ into _________.
data : info
A chain of grocery stores analyzes the buying patterns of its customers using data collected on customers' loyalty cards and uses this information to send e-coupons to customers that target the purchases they have made over the past 90 days. This is an example of
data minning
Always Analyzing, Inc. has gathered a great deal of information and now needs to make sense of the data. What would help Always Analyzing to organize its information in a useful way?
data minning
Which of the following is BEST described as the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information?
data minning
Information that is collected must be stored for retrieval in the future. What are these electronic storage files called?
data wharehousing
What can managers use to test out business models before actually implementing them, allowing the manager to try various alternatives before choosing one?
decision support systems
Marcus would like to increase the capacity of his production line. Before he makes any investment, he would like to know what it would cost to operate at a higher capacity, how much product he would have to sell, and other information to help him decide if this is a good idea. What would help Marcus make this decision?
decison support system
What can managers use to test out business models before actually implementing them, allowing the manager to try various alternatives before choosing one?
decison support systems
Hypertext transfer protocol is used to connect which of the following?
documents or web pages on the world wide web
Which of the following is BEST described as the use of the Internet and other electronic means for retailing and business-to-business transactions?
e commerce
Jason uses the Internet to sell his products to customers. They can view all the design options, choose colors, order, and pay online. Jason is participating in ________
e-commerce
The process of changing text so that it is no longer easy to read to anyone without the translation key or code is known as _______. A. encryption
encryption
Totally Technical, Inc. utilizes a system wherein only the intended recipient can open an e-mail. If someone else tries to open the e-mail, all he or she will see is a bunch of letters and numbers that don't make any sense. What is Totally Technical using?
encryption system
Your company is considering switching from a client-server based accounting system to a cloud-based system. Which of the following would be the greatest advantage of such a switch?
enhanced user flexibility
Which of the following will allow firms to organize and manage a firm's activities across product lines, departments, and geographic locations?
enterprise recource planning
is used by a firm to organize and manage activities (such as manufacturing, purchasing, sales, and delivery) across all product lines and even geographic activities.
enterprise recourising planning erp
What allows a manager to check on the status of an order, analyze delivery performance, review productivity status, and manage company activities using real-time information?
enterprise recourse planning erp
During an interview, Jane was asked for her Facebook user name and password. Caught off guard, Jane provided the information. When she had a chance to think about this, Jane decided this was an invasion of her privacy and she was not interested in working for companies that seek this type of information. Yet, companies have a right to ask and often get this information. What type of issue has been created for Jane and the organization where she interviewed because of IT and the potential consequences of using IT?
ethical concerns
A private network that allows an organization to securely share a portion of its information or operations with suppliers, vendors, partners, customers or other businesses is known as a(n)
extranet
Jonah bought a new grill and had difficulty assembling it. He was able to download a more detailed user manual from the manufacturer's website through use of its _
extranet
A(n) is a security system with special software or hardware devices designed to keep computers safe from hackers.
firewall
Part of a computer system or network that is designed to block unauthorized access while still permitting communication is known as a(n
firewall
The fraudulent acquisition and use of another person's private and personal information, usually for financial gain, is known as ___
identiy theft
When raw data is made into meaningful, useful interpretations, what has been created?
information
Who is responsible for the technology that gathers, stores, and interprets data at the workplace?
information system managers
Many organizations protect , which is something produced by the intellect that has commercial value
intellectual property
Many organizations protect , which is something produced by the intellect that has commercial value.
intellectual property
Information, Inc. employees can access all sorts of company information from their computers, including production data, product design details, marketing activities, and even company benefits. Only employees and those suppliers that are granted special access can view this information. What BEST describes Information, Inc.'s system?
intranet
How does technology create more efficient organizations?
it allows companies to employ fewer people
Workers in specialty fields, such as engineers, scientists, and IT specialists use to create, store, and transmit new ideas to be used in future applications.
knowledge info systems
Viruses, worms, Trojan horses, and other infectious software are known as
maleware
Evergrow has just purchased a company in Canada, and is now working to integrate the Canadian systems with the U.S.-based systems. These systems include areas such as cash flow, sales, production scheduling, and shipping. Which of the following systems will help Evergrow better integrate the newly acquired facility with existing ones?
managemtn info system
What allows companies to produce in large quantities while still providing their customers the opportunity to select individual features and options?
mass customization
Companies often prefer to produce products in large volume as a cost-saving measure; however, consumers often prefer unique items. What is the process of combining these two opposing desires?
mass customizaton
Danielle receives an email, supposedly from the college, telling her that her email account has exceeded its mail quota on their server database and her account will become inactive in 24-48 hours unless she clicks on a link and verifies her account by providing her password and student ID number. This is likely an example of _
phishing
is(are) intended to lure Internet users to bogus websites in order to collect the user's personal data, such as passwords, account numbers, and credit card numbers.
phising schemes
Which of the following BEST describes an intranet?
private network belonging to an org, accesible only to its employees
If you receive an e-mail asking for your bank information or social security number, check out the website carefully. Someone is likely trying to get your personal information in order to empty your bank accounts. What is this scheme known as?
pshining
The IT director of your company has identified three boxes of credit reports and other customer data that have been marked as expired and ready for disposal. She should _
shred the documents
tell the computer how to function, what resources to use, and how to use them and include application programs for specific activities.
software programs
Which of the following BEST describes antivirus software?
software that searches incoming emails and data files for signatures of known virusies and virus like characters
intellectual property?
something produced by the mind that has commercial value
Unwanted e-mail messages that include advertising or inappropriate content are known as
spam
is a program unknowingly installed on a computer without the knowledge of the owner to collect the information about Internet interaction, passwords, and other valuable data.
spyware
In creating a company based on mass customization, which of the following would be the greatest barrier?
standardized assembbly line
Hackers use phishing, pharming, spyware, or spamming to collect personal information to_____
steal their targets identity or monetary gain
The U.S. government is creating data signals that will go through walls, beams, and hills, allowing users to use the Internet without cell phone or Internet bills to pay. What is the name of this system?
super wifi network
Which of the following BEST describes a computer network?
the architecture on a system that allows severl computers to link together and share recoureces such as a printer
Which of the following BEST describes computer hardware?
the physical components of a computer
Which of the following BEST describes how an organization will use an information system?
to convert data into info and to collect, process, and transit that info tfor better decison making
How are management information systems used within an organization?
to support short and long term decision making in an organization by generating reports. schedules, plans and budgets
How are decision-support systems used by managers?
to test a virtual business model to see if the data behaves as predicted
How are decision-support systems used by managers?
to test virtual business model to see if the data behaves as predicted
Which of the following is the BEST definition of e-commerce?
use of internet and other electionic means for retailing an business to business transactions
Terrific Technology has linked all of its computers throughout the United States. What is Terrific Technology using to accomplish this?
wide area network wan
Using another person's private but unsecured wireless network without their permission or knowledge is known as _
wireless mooching
Which of the following is a network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances?
wireless wide area network
Which of the following can travel through a computer network and spread infected files without you having to open any software?
worm
Which of the following can be described as a network of geographically dispersed transmitter-receivers that send signals to and receive signals from satellite, exchanging voice, video, and data transmissions?
VAST satalite communication