Ch 14: information technology (IT) for business

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Computer-aided design (CAD) ___________.

Helps knowledge workers design products by stimulating them and displaying them in 3D graphics.

Software that assigns an email message to a unique code number (digital footprint) for each computers to only that computer, not others, can open and read the message best defines _____________.

An encryption system

____________ system allows outsiders limited access to a firm's internal information network.

An extranet

____________ is a security systems with special software or hardware devices designed to keep computers safe from hackers.

A firewall

What is VSAT satellite communication?

A network of geographically dispersed transmitter receivers that send signals to and receive signals from satellites, exchanging voice, video, and data transmissions.

Which of the following is the definition of a wireless wide area network (WWAN)?

A network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances

Antivirus software is ____________.

A product that protects systems by searching incoming emails and data files for signatures of known viruses and virus-like characteristics

Which of the following best defines spyware?

A program unknowingly downloaded by users by things such as free software that, once installed, crawls around to monitor the host's computer activities

A network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances best defines ____________.

A wireless wide area network

__________ is an organization's private network of internally linked websites accessible only to employees.

An intranet

Which of the following best defines denial of service?

Attacks that flood networks or websites with bogus requests for information and resources, thereby overloading and shutting the networks or websites down, preventing legitimate users from accessing them

The World Wide Web is a(n) _____________.

Branch of the internet consisting of interlinked hypertext documents, or web pages

__________ make(s) up a wide area network.

Computers that are linked over long distances through long-distance telephone wires, microwave signals, or satellite communications.

The Internet has spawned a number of business communications technologies, including _______________, which is information technology that allows groups of people to communicate simultaneously from various locations via e-mail, phone, or video.

Electronic conferencing

Phishing is ___________.

Schemes that lure internet users to bogus websites

Junk email sent to a mailing list best defines _______________.

Spam

Which of the following is the definition of data mining?

The application of electronic technologies for searching, sifting, and reorganizing pools to uncover useful information

Data warehousing is _____________.

The collection, storage, and retrieval of data in electronic files.

_____________ is a gigantic system of interconnected computer networks linked by voice, electronic, and wireless technologies.

The internet

Information systems _______________.

Use IT resources that enable managers to take data, raw factors, and figures that, by themselves, may not have much meaning, and turn those data into information

Computers that are linked over long distances through long-distance telephone wires, microwave signals, or satellite communications make up ______________ networks.

Wide area

Software is best defined as ___________.

programs that tell the computer how to function, what resources to use, and how to use them, and applications programs for specific activites.


Set pelajaran terkait

Avian - mareks, myoplasma, and turkey bordatella

View Set

13. Central Nervous System Trauma

View Set

ch 4 adaptive quizzing womens health

View Set

El Día de Los Muertos Questions

View Set

Increased Intracranial Pressure (ICP) NCLEX Questions

View Set

Rad Review test questions, Pt 11, Pt 12

View Set

PRIVACY 2 Privacy for Customer Contact Personnel

View Set

Amoeba Sisters Video Recap: Photosynthesis and Cellular Respiration

View Set

Chapter 4 The Solar System AST 220

View Set

PNC 1: Legal, Ethics, Culture, Spirituality

View Set

Why did the colonists fight the British?

View Set