buss ch14

Ace your homework & exams now with Quizwiz!

Which of the following BEST describes HTTP (hypertext transfer protocol)

a communications protocol used for the world wide web in which related pieces of info on seperate web pages are connected using hyperlinks

A security system that protects computers from hackers is known as​ _

a firewall

What BEST describes a​ "client" in a​ client-server network?

a laptop or desktop computer used to request info

What is VSAT satellite communication?

a network of geographically dispersed transmitter recievers that send signals to and recieve signals from satellite , exchanging voice, video and data transmissions

How is data conferencing​ used?

allows people in a remote location to work on a document at the same time

Which of the following BEST describes software that converts email messages into another form that cannot be easily understood by anyone except parties possessing the key to unscrambling them?

an encryption system

Which of the following protects a computer against hackers by searching incoming​ e-mail and looking for​ dangers?

anti virus software

Which of the following BEST describes a denial of service (DoS) attack?

attacks that flood networks or websites with bogus requests for info and recources , overloading and shutting the networks or websites down and preventing legitimite users from accessing them

ava​ Jones, the local coffee​ spot, was the first in the community to sell Fair Trade coffee and​ teas, allowing them to build a strong clientele in the community.​ Recently, some competition has introduced Fair Trade​ items, luring some customers away. The manager at Java Jones wants to encourage local businesspeople to visit the coffee shop and even host small group meetings there. What should the manager at Java Jones add to entice businesspeople to meet at Java​ Jones?

cloud computing

Our company just purchased a system that allows us to design new products through simulation and show these products in 3D graphics. What type of system did we​ purchase?

computer aided design

Grant Industries has invested in a sophisticated system that uses computer software and machinery to automate its manufacturing​ processes, helping it to increase production​ speeds, consistency, and tooling accuracy. This is an example of

computer aided manufacturing

Mitchell used to be required to leave the​ cool, air-conditioned plant control room to add chemicals to the process every hour or so. Now he adds the chemicals using a machine on the plant​ floor, with just a push of a couple of buttons on his computer without leaving his​ chair! What has provided Mitchell with this​ advantage?

computer aided manufacturing

What type of system could a manufacturer use to provide digital direction to a robot so the robot can move a product through the production process?

computer aided manufacturing

Which of the following BEST describes a wide area network?

computers linked over long distances through long distance telephone wires microwave signals or satelite communicatrions

Using a​ file-sharing service, your sister just gave you copies of​ 14,000 songs she copied from CDs she owns. This is probably​ ________.

copy right violation

what describes hackers

cybercrimminals who gain access to computer systems with the intention of incercepting or steeling data

You have been given a detailed IT report of sales by​ division, by​ product, and by day covering a span of five years. You have been asked to report back on seasonal trends in order to help management implement a more efficient supply chain management and inventory system. This is an example of converting​ _______ into​ _________.

data : info

A chain of grocery stores analyzes the buying patterns of its customers using data collected on​ customers' loyalty cards and uses this information to send​ e-coupons to customers that target the purchases they have made over the past 90 days. This is an example of​

data minning

Always​ Analyzing, Inc. has gathered a great deal of information and now needs to make sense of the data. What would help Always Analyzing to organize its information in a useful​ way?

data minning

Which of the following is BEST described as the application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information?

data minning

Information that is collected must be stored for retrieval in the future. What are these electronic storage files called?

data wharehousing

What can managers use to test out business models before actually implementing them, allowing the manager to try various alternatives before choosing one?

decision support systems

Marcus would like to increase the capacity of his production line. Before he makes any​ investment, he would like to know what it would cost to operate at a higher​ capacity, how much product he would have to​ sell, and other information to help him decide if this is a good idea. What would help Marcus make this​ decision?

decison support system

What can managers use to test out business models before actually implementing them, allowing the manager to try various alternatives before choosing one?

decison support systems

Hypertext transfer protocol is used to connect which of the​ following?

documents or web pages on the world wide web

Which of the following is BEST described as the use of the Internet and other electronic means for retailing and business-to-business transactions?

e commerce

Jason uses the Internet to sell his products to customers. They can view all the design​ options, choose​ colors, order, and pay online. Jason is participating in​ ________

e-commerce

The process of changing text so that it is no longer easy to read to anyone without the translation key or code is known as​ _______. A. encryption

encryption

Totally​ Technical, Inc. utilizes a system wherein only the intended recipient can open an​ e-mail. If someone else tries to open the​ e-mail, all he or she will see is a bunch of letters and numbers that​ don't make any sense. What is Totally Technical​ using?

encryption system

Your company is considering switching from a​ client-server based accounting system to a​ cloud-based system. Which of the following would be the greatest advantage of such a​ switch?

enhanced user flexibility

Which of the following will allow firms to organize and manage a firm's activities across product lines, departments, and geographic locations?

enterprise recource planning

is used by a firm to organize and manage activities​ (such as​ manufacturing, purchasing,​ sales, and​ delivery) across all product lines and even geographic activities.

enterprise recourising planning erp

What allows a manager to check on the status of an​ order, analyze delivery​ performance, review productivity​ status, and manage company activities using​ real-time information?

enterprise recourse planning erp

During an​ interview, Jane was asked for her Facebook user name and password. Caught off​ guard, Jane provided the information. When she had a chance to think about​ this, Jane decided this was an invasion of her privacy and she was not interested in working for companies that seek this type of information.​ Yet, companies have a right to ask and often get this information. What type of issue has been created for Jane and the organization where she interviewed because of IT and the potential consequences of using​ IT?

ethical concerns

A private network that allows an organization to securely share a portion of its information or operations with suppliers, vendors, partners, customers or other businesses is known as a(n)

extranet

Jonah bought a new grill and had difficulty assembling it. He was able to download a more detailed user manual from the​ manufacturer's website through use of its​ _

extranet

A(n) is a security system with special software or hardware devices designed to keep computers safe from hackers.

firewall

Part of a computer system or network that is designed to block unauthorized access while still permitting communication is known as​ a(n

firewall

The fraudulent acquisition and use of another​ person's private and personal​ information, usually for financial​ gain, is known as​ ___

identiy theft

When raw data is made into meaningful, useful interpretations, what has been created?

information

Who is responsible for the technology that gathers, stores, and interprets data at the workplace?

information system managers

Many organizations protect , which is something produced by the intellect that has commercial value

intellectual property

Many organizations protect , which is something produced by the intellect that has commercial value.

intellectual property

​Information, Inc. employees can access all sorts of company information from their​ computers, including production​ data, product design​ details, marketing​ activities, and even company benefits. Only employees and those suppliers that are granted special access can view this information. What BEST describes​ Information, Inc.'s​ system?

intranet

How does technology create more efficient​ organizations?

it allows companies to employ fewer people

Workers in specialty fields, such as engineers, scientists, and IT specialists use to create, store, and transmit new ideas to be used in future applications.

knowledge info systems

​Viruses, worms, Trojan​ horses, and other infectious software are known as​

maleware

Evergrow has just purchased a company in​ Canada, and is now working to integrate the Canadian systems with the​ U.S.-based systems. These systems include areas such as cash​ flow, sales, production​ scheduling, and shipping. Which of the following systems will help Evergrow better integrate the newly acquired facility with existing​ ones?

managemtn info system

What allows companies to produce in large quantities while still providing their customers the opportunity to select individual features and​ options?

mass customization

Companies often prefer to produce products in large volume as a cost-saving measure; however, consumers often prefer unique items. What is the process of combining these two opposing desires?

mass customizaton

Danielle receives an​ email, supposedly from the​ college, telling her that her email account has exceeded its mail quota on their server database and her account will become inactive in​ 24-48 hours unless she clicks on a link and verifies her account by providing her password and student ID number. This is likely an example of​ _

phishing

is(are) intended to lure Internet users to bogus websites in order to collect the user's personal data, such as passwords, account numbers, and credit card numbers.

phising schemes

Which of the following BEST describes an intranet?

private network belonging to an org, accesible only to its employees

If you receive an​ e-mail asking for your bank information or social security​ number, check out the website carefully. Someone is likely trying to get your personal information in order to empty your bank accounts. What is this scheme known​ as?

pshining

The IT director of your company has identified three boxes of credit reports and other customer data that have been marked as expired and ready for disposal. She should​ _

shred the documents

tell the computer how to function, what resources to use, and how to use them and include application programs for specific activities.

software programs

Which of the following BEST describes antivirus software?

software that searches incoming emails and data files for signatures of known virusies and virus like characters

intellectual property?

something produced by the mind that has commercial value

Unwanted​ e-mail messages that include advertising or inappropriate content are known as​

spam

is a program unknowingly installed on a computer without the knowledge of the owner to collect the information about Internet interaction, passwords, and other valuable data.

spyware

In creating a company based on mass​ customization, which of the following would be the greatest​ barrier?

standardized assembbly line

Hackers use​ phishing, pharming,​ spyware, or spamming to collect personal information​ to_____

steal their targets identity or monetary gain

The U.S. government is creating data signals that will go through walls, beams, and hills, allowing users to use the Internet without cell phone or Internet bills to pay. What is the name of this system?

super wifi network

Which of the following BEST describes a computer network?

the architecture on a system that allows severl computers to link together and share recoureces such as a printer

Which of the following BEST describes computer hardware?

the physical components of a computer

Which of the following BEST describes how an organization will use an information system?

to convert data into info and to collect, process, and transit that info tfor better decison making

How are management information systems used within an organization?

to support short and long term decision making in an organization by generating reports. schedules, plans and budgets

How are decision-support systems used by managers?

to test a virtual business model to see if the data behaves as predicted

How are decision-support systems used by managers?

to test virtual business model to see if the data behaves as predicted

Which of the following is the BEST definition of​ e-commerce?

use of internet and other electionic means for retailing an business to business transactions

Terrific Technology has linked all of its computers throughout the United States. What is Terrific Technology using to accomplish​ this?

wide area network wan

Using another​ person's private but unsecured wireless network without their permission or knowledge is known as​ _

wireless mooching

Which of the following is a network that uses airborne electronic signals instead of wires to link computers and electronic devices over long distances?

wireless wide area network

Which of the following can travel through a computer network and spread infected files without you having to open any​ software?

worm

Which of the following can be described as a network of geographically dispersed transmitter-receivers that send signals to and receive signals from satellite, exchanging voice, video, and data transmissions?

VAST satalite communication


Related study sets

Exemplar 11.C - Traumatic Brain Injury (TBI)

View Set

Understanding Business Chapter 9

View Set

Principles of Life 3.3 Study Guide

View Set