Chapter 14
All of the following are examples of the impact of technology EXCEPT _______.
creating portable offices
Cybercriminals who gain unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data are called _______.
hackers
A company's _______ can be accessed only by employees or those with specific permission, whereas its _______ allows those outside the organization to access certain parts of its network.
intranet; extranet
Maia receives an e-mail that appears to be from her bank, advising that it is conducting an account verification process. The e-mail asks Maia to click on a link to update her account information, including her name, address, account number, and Social Security number. This is likely an example of _______.
phishing
IT-based industries, including computer backup and identity-theft protection, offer valuable services for individuals and business customers. This example shows that IT ________.
provides new business opportunities
The global communication network that allows millions of computers worldwide to connect and exchange information is known as _______.
the Internet
_______ networks are used to link computers in a relatively small geographic area, such as a single building or a group of buildings
Local Area
__ exists in a file that attaches itself to a program and migrates from computer to computer as a shared program or as an e-mail attachment. It does not infect the system unless the user opens the contaminated file.
A computer virus
___ is a security system with special software or hardware devices designed to keep computers safe from hackers.
A firewall
_______ enables managers to transform data into information and collect, process, and transmit that information for use in decision making.
An information system (IS)
How does a firewall prevent unauthorized access to a computer system?
By filtering incoming data by applying a security policy and using a router to control where data goes
Raw, unanalyzed facts and figures are known as _______.
Data
Which of the following BEST describes the difference between data and information?
Data are raw facts or figures; information is the interpretation of that data.
_______ is the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information.
Data mining
As the newly hired network administrator for a small business, you notice that the company is running a very old version of Microsoft Windows. Which is your BEST course of immediate action?
Download and install the most recent software update
__ assigns an e-mail message to a unique code number (digital fingerprint) for each computer so only that computer, not others, can open and read the message.
Encryption system software
Which of the following is an information system for organizing and managing a firm's activities across product lines, departments, and geographic locations?
Enterprise resource planning (ERP)
Which of the following is NOT an ethical concern for information technology?
Installing software updates
Which of the following BEST describes the benefit of mass customization for an organization?
It allows companies to manufacture products in large volumes, but each item features the unique customer options.
In addition to your résumé and personal and professional references, which of the following would give a potential employer the BEST insight into your personal and professional life?
Social networks such as Facebook and LinkedIn
__ is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that is then transmitted to someone outside the host system.
Spyware
For which of the following purposes would a company use data mining?
To identify trends, patterns, and relationships among the data it has amassed
Midland Community College has a private computer network that can be accessed only by employees. It contains the college's policies and procedures, the employee handbook, internal job postings, confidential information about employee benefits, and other restricted information. This is an example of _______.
an intranet
A _______ is an interactive system that creates virtual business models for a particular kind of decision and tests them with different data to see how they respond.
decision support system (DSS)
Paulo applies for a mortgage loan and is turned down. He obtains a copy of his credit report and learns that someone using his name, address, and Social Security number has opened numerous credit card accounts and obtained a car loan. Paulo has been the victim of _______.
identity theft
Ownership and right to the use of _______ may be protected by patent, copyright, trademark, and other means. But crooks may be able to create unauthorized duplications.
intellectual property
A(n) _______ is an information system that supports knowledge workers by providing resources to create, store, use, and transmit new knowledge for useful applications.
knowledge management system
Your boss has asked you to create an e-mail marketing campaign that will blanket purchased user lists with messages that appear to be from friends and acquaintances recommending the company's products. Your BEST response would be that this could be both ______ and _______.
unethical; illegal
During the 2020 COVID-19 pandemic, companies sent their employees home. Companies implemented protocols for __________ such as Zoom, to bring quarantined workers back into meeting environments. This allowed organizations to maintain function even when employees were, at times, many miles away from their normal workplace.
video conferencing
Data _______ refers to the collection, storage, retrieval, and management of data in an organization's electronic files.
warehousing