Chapter 14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

All of the following are examples of the impact of technology EXCEPT _______.

creating portable offices

Cybercriminals who gain unauthorized access to a computer or network, either to steal information, money, or property or to tamper with data are called _______.

hackers

A company's _______ can be accessed only by employees or those with specific permission, whereas its _______ allows those outside the organization to access certain parts of its network.

intranet; extranet

Maia receives an e-mail that appears to be from her bank, advising that it is conducting an account verification process. The e-mail asks Maia to click on a link to update her account information, including her name, address, account number, and Social Security number. This is likely an example of _______.

phishing

IT-based industries, including computer backup and identity-theft protection, offer valuable services for individuals and business customers. This example shows that IT ________.

provides new business opportunities

The global communication network that allows millions of computers worldwide to connect and exchange information is known as _______.

the Internet

_______ networks are used to link computers in a relatively small geographic area, such as a single building or a group of buildings

Local Area

__ exists in a file that attaches itself to a program and migrates from computer to computer as a shared program or as an e-mail attachment. It does not infect the system unless the user opens the contaminated file.

A computer virus

___ is a security system with special software or hardware devices designed to keep computers safe from hackers.

A firewall

_______ enables managers to transform data into information and collect, process, and transmit that information for use in decision making.

An information system (IS)

How does a firewall prevent unauthorized access to a computer system?

By filtering incoming data by applying a security policy and using a router to control where data goes

Raw, unanalyzed facts and figures are known as _______.

Data

Which of the following BEST describes the difference between data and information?

Data are raw facts or figures; information is the interpretation of that data.

_______ is the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information.

Data mining

As the newly hired network administrator for a small business, you notice that the company is running a very old version of Microsoft Windows. Which is your BEST course of immediate action?

Download and install the most recent software update

__ assigns an e-mail message to a unique code number (digital fingerprint) for each computer so only that computer, not others, can open and read the message.

Encryption system software

Which of the following is an information system for organizing and managing a firm's activities across product lines, departments, and geographic locations?

Enterprise resource planning (ERP)

Which of the following is NOT an ethical concern for information technology?

Installing software updates

Which of the following BEST describes the benefit of mass customization for an organization?

It allows companies to manufacture products in large volumes, but each item features the unique customer options.

In addition to your résumé and personal and professional references, which of the following would give a potential employer the BEST insight into your personal and professional life?

Social networks such as Facebook and LinkedIn

__ is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that is then transmitted to someone outside the host system.

Spyware

For which of the following purposes would a company use data mining?

To identify trends, patterns, and relationships among the data it has amassed

Midland Community College has a private computer network that can be accessed only by employees. It contains the college's policies and procedures, the employee handbook, internal job postings, confidential information about employee benefits, and other restricted information. This is an example of _______.

an intranet

A _______ is an interactive system that creates virtual business models for a particular kind of decision and tests them with different data to see how they respond.

decision support system (DSS)

Paulo applies for a mortgage loan and is turned down. He obtains a copy of his credit report and learns that someone using his name, address, and Social Security number has opened numerous credit card accounts and obtained a car loan. Paulo has been the victim of _______.

identity theft

Ownership and right to the use of _______ may be protected by patent, copyright, trademark, and other means. But crooks may be able to create unauthorized duplications.

intellectual property

A(n) _______ is an information system that supports knowledge workers by providing resources to create, store, use, and transmit new knowledge for useful applications.

knowledge management system

Your boss has asked you to create an e-mail marketing campaign that will blanket purchased user lists with messages that appear to be from friends and acquaintances recommending the company's products. Your BEST response would be that this could be both ______ and _______.

unethical; illegal

During the 2020 COVID-19 pandemic, companies sent their employees home. Companies implemented protocols for __________ such as Zoom, to bring quarantined workers back into meeting environments. This allowed organizations to maintain function even when employees were, at times, many miles away from their normal workplace.

video conferencing

Data _______ refers to the collection, storage, retrieval, and management of data in an organization's electronic files.

warehousing


Set pelajaran terkait

Chapter_6_ Principles of Network Security

View Set

4410: Exam 1- Perfusion and Infection

View Set

Module 13: Automation (11/13 - 11/19)

View Set

Chapter 6: Osseous Tissue and Bone Structure (Review Questions)

View Set

Management Principles- Module 9 (chapter 6)

View Set

med surg test 1 pp, med surge test 2, med surge test 3 pp, med surge final

View Set

Review Investment Recommendations: portfolio management styles/techniques

View Set