Language:EN
Pages: 22
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
including norton systemworks and norton antivirus

Including norton systemworks and norton antivirus

This OpenStax ancillary resource is © Rice University under a CC BY 4.0 International license; it may be reproduced or modified but must be attributed to Chapter 13 USING TECHNOLOGY TO MANAGE INFORMATION

TRUE-FALSE QUESTIONS

a. True
b. False

Title: ANSWER: T REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 3. The Internet is essentially a worldwide wide area network (WAN).

Title: ANSWER: T REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 5. Like local area networks (LANs), intranets are private corporate networks.

a. True
b. False

a. True
b. False

Title: ANSWER: F REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 RATIONALE: ASPs are also called application service providers.

a. True
b. False

Title: ANSWER: T REFERENCE: Management Information Systems LEARNING OUTCOME: 3
10. An accounts clerk who is able to record a payment of 50 dollars into the company's main computer system as the payment is made is using an online processing system.

Title: ANSWER: F REFERENCE: Management Information Systems LEARNING OUTCOME: 3 RATIONALE: An expert system gives managers advice similar to what they would get from a human consultant.

13. The primary use for an expert system is to answer “what if” questions.

15. Knowledge management is much easier than information management.

a. True
b. False

a. True
b. False

Title: ANSWER: F REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 RATIONALE: These are computer viruses.

a. True
b. False

Title: ANSWER: F REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6 RATIONALE: Grid computing provides a way to divide mammoth tasks into smaller tasks 20. Grid computing is another term used for telecommuting.

22. The shift to virtual workers has been a disappointing trend that is gradually vanishing.

a. True
b. False

October 22, 2018 3

2. _____ contribute to and benefit from information that use in performing, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions.

Title: ANSWER: B REFERENCE: Transforming Business Through Information LEARNING OUTCOME: 1 RATIONALE: Databases are electronic filing systems that collect and organize data and information. 5. Cerner Corporation has created a(n) _____ containing the medical records of more than 400,000 people who received treatment at more than 200 different emergency rooms. It can be used to help emergency room physicians make decisions about what kind of treatment to give their patients.

A. customer relational network
B. database
C. spreadsheet
D. information processing network
E. transactional network

Title: ANSWER: B REFERENCE: Transforming Business Through Information LEARNING OUTCOME: 1 7. The governor of New York that he has directed the state's Division of Criminal Justice Services to gather

DNA from the broadest range of convicted criminals permitted under current law. This will result in the

A. relational network
B. database management system
C. spreadsheet
D. information processing network
E. transactional network

Title: ANSWER: B REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
8. A group of two or more computer systems linked together by communications channels to share data and information is called a computer:
A. database
B. network
C. mainframe
D. combination
E. conglomerate

October 22, 2018 5

10. Which of the following statements about computer networks is true?

Title: ANSWER: A REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 11. Which of the following statements about computer networks is true?

A. Computer networks include clients and servers.

Title: ANSWER: C REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 1
12. A(n) _____ is the collective term that describes the methods and the equipment used to provide information about all aspects of a firm’s operation.

A. information processing system
B. information network
C. management information system
D. transaction processing system
E. customer relational network

Title: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
15. _____ offer companies a more cost-effective way to link computers than linking terminals to a mainframe computer.

A. Intranets

Title: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 18. _____ are examples of wide area networks (WANs).

A. Functional and process networks
B. Hierarchical and matrix networks
C. Functional and hierarchical networks
D. Extranets and intranets
E. Personal and nonpersonal networks

21. NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):

October 22, 2018 7

A. intranet
B. functional network
C. specialized network
D. extranet
E. information system

Title: ANSWER: E REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
23. Intranets are essentially mini-Internets that operate behind a(n) _____ that prevents unauthorized access.

Title: ANSWER: C REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
RATIONALE: Many organizations use VPNs to connect two or more private networks over a public network, such as the Internet.

26. To keep pace with changing technology, officers of the Honolulu Police Department (HPD) needed a better means to perform such tasks as running a license plate number while simultaneously sending back field reports to precinct headquarters. Through the use of a _____, officers were able to use the Internet to connect with the information stored in state databases and to connect with their superiors.

Title: ANSWER: B REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
28. A(n) _____ is a service company that buys and maintains software on its servers and distributes it through high-speed networks to subscribers for a set period of time and a predetermined price.

A. batch processor
B. application service provider
C. extranet
D. intranet
E. service warehouse

A. work station
B. internal network
C. virtual network
D. enterprise portal

October 22, 2018 9

Title: ANSWER: E REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 34. Companies are adopting enterprise portals because the portals:
A. perform tasks and processes more quickly than other methods
B. provide cost savings through the elimination of “information intermediaries”C. improve communications with customers, suppliers, dealers, and distributors D. can be used to integrate disparate systems and multiple sets of information
E. do all of the above

Title: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
RATIONALE: An enterprise portal is an internal Web site that provides proprietary corporate information to a defined user group.

Title: ANSWER: A REFERENCE: Management Information Systems LEARNING OUTCOME: 3
37. Which type of information systems is used by both operational managers and middle managers?

October 22, 2018 10

A. off-line
B. on-line
C. auxiliary
D. batch
E. group

Title: ANSWER: B REFERENCE: Management Information Systems LEARNING OUTCOME: 3 40. Processing data as they become available is called _____ processing.

Title: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3
RATIONALE: A data warehouse is an organization’s management support system that combines many databases to improve management decision making.

42. In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic. Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited. All of the customer information gathered was stored in a(n):

Title: ANSWER: A REFERENCE: Management Information Systems LEARNING OUTCOME: 3
44. Data warehouses may contain many _____, subsets of a data warehouse that each deal with a single

area of data.

46. Victoria Secret maintains a large data warehouse in which it keeps track of inventory, buying patterns, and regional differences. An examination of information from a data warehouse subset that contained data from its Miami, Florida, stores showed that for every one black bra purchased ten ivory bras were purchased. This subset is referred to as a(n):
A. data mart
B. information network
C. data mine
D. information cluster
E. data nugget

Title: ANSWER: B REFERENCE: Management Information Systems LEARNING OUTCOME: 3
47. A system that collects and stores the company's key data and produces the information needed by managers for analysis, control, and decision making is called a(n):
A. office automation system

Title: ANSWER: A REFERENCE: Management Information Systems LEARNING OUTCOME: 3
49. If a manager needs a reporting system that provides the ability to ask "what if" questions, he or she would probably install a(n) _____ system.

A. decision support
B. transaction processing
C. operating
D. expert
E. information reporting

A. transaction processing system
B. decision support system
C. information reporting system
D. expert system
E. office automation system

Title: ANSWER: B REFERENCE: Management Information Systems LEARNING OUTCOME: 3
52. Cerner Corporation has created a(n) ______ that helps emergency room physicians make decisions

suggestions as to possible treatments.

A. transaction processing system
B. decision support system
C. information reporting system
D. expert system
E. office automation system

Title: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3
54. A(n) _____ is a management support system that is customized for an individual executive. It provides specific information for strategic decision making.

A. decision support system
B. expert system
C. information automated system
D. executive information system
E. management database system

Title: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3 RATIONALE: An expert system replaces human consultants.

57. Academic advisement is unevenly provided in many high schools and colleges. There is a plan to provide advice to high school students and to college freshmen that are seeking a potential major. The on-demand consultation gathers information about a student's grades, interests, test scores, interests and aptitudes. It assesses student qualifications for a variety of majors. The _____ will then recommend six majors for them to consider and provides further information sources about the major.

A. office automation system
B. information reporting system
C. expert system
D. data channel
E. transaction communications system

Title: ANSWER: C REFERENCE: Management Information Systems LEARNING OUTCOME: 3 59. Office automation decisions are specifically designed to:
A. replace costly experts
B. analyze databases
C. improve organizational communications
D. maintain organizational culture
E. make decisions with a higher degree of certainty

Title: ANSWER: A REFERENCE: Technology Management and Planning LEARNING OUTCOME: 4
61. _____ management focuses on gathering and sharing an organization’s collective knowledge to improve productivity and foster innovation.

A. Knowledge
B. Entrepreneurial
C. Creative
D. Information
E. Productivity

D. data mining
E. information screening

Title: ANSWER: B REFERENCE: Technology Management and Planning LEARNING OUTCOME: 4 63. Which of the following statements about knowledge management is true?

E. All of the above statements about knowledge management are true.

Title: ANSWER: E REFERENCE: Technology Management and Planning LEARNING OUTCOME: 4 64. A good technology plan provides employees with the tools they need to perform their jobs at the highest levels of efficiency. The first step in developing a good technology plan is:
A. a situational analysis
B. budgeting
C. the establishment of rules and regulations
D. brainstorming
E. a general needs assessment

C. What are the company’s priorities, both short-term and long-term?

D. How can technology help the company solve its problems?

A. unauthorized access
B. chat rooms
C. sexual innuendoes expressed through lewd humor
D. biometrics
E. consumer privacy

October 22, 2018 16

Title: ANSWER: C REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 71. Copying of software programs by people who haven't paid for them is called:
A. unfair access
B. software shrinkage
C. software piracy
D. technological turnover
E. hardware sabotage

Title: ANSWER: D REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5
72. A computer program that copies itself into other software and can spread to other computer systems is called:
A. computer guerrilla activity
B. a computer vindication
C. a software infestation
D. a computer virus
E. a computer breach

Title: ANSWER: A REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 74. How does unsolicited and unwanted e-mail pose a security risk to companies?
A. Viruses spread through e-mail attachments.

B. Hackers enter systems through e-mail.

A. privacy management, virus suppression, and enterprise portals
B. grid computing, on-demand computing, and real-time computing
C. digital forensics, the distributed workforce, and grid computing
D. knowledge management, privacy management, and intranets
E. privacy management, enterprise warehouses, and knowledge management

Title: ANSWER: C REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6
76. The idea behind _____ is the need that criminal investigators have for examining evidence on computer hard drives such as in e-mails or databases in order to build cases against embezzlers and others.

Title: ANSWER: A REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6

October 22, 2018 18

FILL-IN-THE-BLANK QUESTIONS

Title: ANSWER: Information technology REFERENCE: Principles of Information Technology LEARNING OUTCOME: 1
1. _____ is the equipment and techniques used to manage and process information.

Title: ANSWER: Virtual private networks (VPNs) REFERENCE: Linking Up: Computer Networks
6. _____ are private corporate networks connected over a public network, like the Internet, that include strong security measures which allow only authorized users to access the network.

LEARNING OUTCOME: 2

Title: ANSWER: online or real-time REFERENCE: Management Information Systems LEARNING OUTCOME: 3 9. When data are processed upon receipt and immediately put into the data-processing system, the firm is using a(n) _____ processing system.

Title: ANSWER: data warehouse REFERENCE: Management Information Systems LEARNING OUTCOME: 3 10. A ____ is any information technology that combines many databases across an entire company into one central database that supports management decision making.

Title: ANSWER: Data mining REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 15. _____ is a sophisticated database application that looks for hidden patterns in a group of data to help track and predict future behavior.

SHORT ANSWER QUESTIONS

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Donald Jones

PageId: DOC788C817