Bus 104 Slides 13
high quality information
Accurate and reliable
Which of the following statements about computer viruses is most accurate?
Although antivirus software can help identify and eliminate known viruses No Viruses can be completely eliminated No- The internet contains built in
___________ technology uses cable modems, digital subscriber lines, fixed wireless, and satellites to provide users with significantly faster internet connections than are provided by traditional 56k modems.
Broadband No Analog No- Wide beam
_______________ are raw, unanalyzed, and unorganized facts and figures.
Data
___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.
Data mining
data mining
Discover unexpected relationships among the data stored by his or her organization
A(n) ___________ is a semiprivate network that uses internet technology to enable more than one company to access the same information or to allow people on different servers to collaborate.
Extranet
The first step a manager should take to cope with information overload is to:
Identify 4-5 key goals, and eliminate information that is not related to those goals
Sales...
Information while the raw figures used to commute the statistics No An example of
An ________ is a companywide network that is based on internet-like Technology, but is closed to public access.
Intranet
__________ is information charged with enough intelligence to make it relevant and useful
Knowledge No- Data
In theory if Robert has complete accurate information about a business decision he has to make, there is:
No risk at all No Same risk as if only some information are known No- Moderate risk
Rob has been using Dropbox. The cloud he is storing his information to is called a:
Public cloud
The tree types of cloud computing are:
Public, private, and hybrid cloud
Employees of a business __________ when they work at home, using computers linked to their organization's office
Telecommute
A(n) ________________ is a private data network that creates secure connections over regular internet lines
Virtual private networking
A computer _________________ is a piece of programming code that is inserted into other programming to cause an unexpected and often undesirable event for the victim
Virus
Since 1988, Bigbux National Bank has tried to make use of new technologies to expand the services it offers to its customers. For example, depositors can obtain updated financial information about their accounts and handle certain types of transactions whenever they wish simply by visiting the bank's website and providing a user name and password. The type of technology Bigbux National Bank uses to provide these services is known as:
information technology