Including norton systemworks and norton antivirus
This OpenStax ancillary resource is © Rice University under a CC BY 4.0 International license; it may be reproduced or modified but must be attributed to Chapter 13 USING TECHNOLOGY TO MANAGE INFORMATION
TRUE-FALSE QUESTIONS
a. True
b. False
Title: ANSWER: T REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 3. The Internet is essentially a worldwide wide area network (WAN).
Title: ANSWER: T REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 5. Like local area networks (LANs), intranets are private corporate networks.
a. True
b. False
a. True
b. False
Title: ANSWER: F REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 RATIONALE: ASPs are also called application service providers.
a. True
b. False
Title: ANSWER: T REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
10. An accounts clerk who is able to record a payment of 50 dollars into
the company's main computer system as the payment is made is using an
online processing system.
Title: ANSWER: F REFERENCE: Management Information Systems LEARNING OUTCOME: 3 RATIONALE: An expert system gives managers advice similar to what they would get from a human consultant.
13. The primary use for an expert system is to answer “what if” questions.
15. Knowledge management is much easier than information management.
a. True
b. False
a. True
b. False
Title: ANSWER: F REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 RATIONALE: These are computer viruses.
a. True
b. False
Title: ANSWER: F REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6 RATIONALE: Grid computing provides a way to divide mammoth tasks into smaller tasks 20. Grid computing is another term used for telecommuting.
22. The shift to virtual workers has been a disappointing trend that is gradually vanishing.
a. True
b. False
October 22, 2018 3
2. _____ contribute to and benefit from information that use in performing, acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions.
Title: ANSWER: B REFERENCE: Transforming Business Through Information LEARNING OUTCOME: 1 RATIONALE: Databases are electronic filing systems that collect and organize data and information. 5. Cerner Corporation has created a(n) _____ containing the medical records of more than 400,000 people who received treatment at more than 200 different emergency rooms. It can be used to help emergency room physicians make decisions about what kind of treatment to give their patients.
A. customer relational network
B. database
C. spreadsheet
D. information processing network
E. transactional network
Title: ANSWER: B REFERENCE: Transforming Business Through Information LEARNING OUTCOME: 1 7. The governor of New York that he has directed the state's Division of Criminal Justice Services to gather
DNA from the broadest range of convicted criminals permitted under current law. This will result in the
A. relational network
B. database management system
C. spreadsheet
D. information processing network
E. transactional networkTitle: ANSWER: B REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
8. A group of two or more computer systems linked together by communications channels to share data and information is called a computer:
A. database
B. network
C. mainframe
D. combination
E. conglomerateOctober 22, 2018 5
10. Which of the following statements about computer networks is true?
Title: ANSWER: A REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 11. Which of the following statements about computer networks is true?
A. Computer networks include clients and servers.
Title: ANSWER: C REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 1
12. A(n) _____ is the collective term that describes the methods and the equipment used to provide information about all aspects of a firm’s operation.A. information processing system
B. information network
C. management information system
D. transaction processing system
E. customer relational networkTitle: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
15. _____ offer companies a more cost-effective way to link computers than linking terminals to a mainframe computer.A. Intranets
Title: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2 18. _____ are examples of wide area networks (WANs).
A. Functional and process networks
B. Hierarchical and matrix networks
C. Functional and hierarchical networks
D. Extranets and intranets
E. Personal and nonpersonal networks
21. NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):
October 22, 2018 7
A. intranet
B. functional network
C. specialized network
D. extranet
E. information system
Title: ANSWER: E REFERENCE: Linking Up: Computer Networks LEARNING
OUTCOME: 2
23. Intranets are essentially mini-Internets that operate behind a(n)
_____ that prevents unauthorized access.
Title: ANSWER: C REFERENCE: Linking Up: Computer Networks LEARNING
OUTCOME: 2
RATIONALE: Many organizations use VPNs to connect two or more private
networks over a public network, such as the Internet.
26. To keep pace with changing technology, officers of the Honolulu Police Department (HPD) needed a better means to perform such tasks as running a license plate number while simultaneously sending back field reports to precinct headquarters. Through the use of a _____, officers were able to use the Internet to connect with the information stored in state databases and to connect with their superiors.
Title: ANSWER: B REFERENCE: Linking Up: Computer Networks LEARNING OUTCOME: 2
28. A(n) _____ is a service company that buys and maintains software on its servers and distributes it through high-speed networks to subscribers for a set period of time and a predetermined price.A. batch processor
B. application service provider
C. extranet
D. intranet
E. service warehouseA. work station
B. internal network
C. virtual network
D. enterprise portalOctober 22, 2018 9
Title: ANSWER: E REFERENCE: Linking Up: Computer Networks LEARNING
OUTCOME: 2 34. Companies are adopting enterprise portals because the
portals:
A. perform tasks and processes more quickly than other methods
B. provide cost savings through the elimination of “information
intermediaries”C. improve communications with customers, suppliers,
dealers, and distributors D. can be used to integrate disparate systems
and multiple sets of information
E. do all of the above
Title: ANSWER: D REFERENCE: Linking Up: Computer Networks LEARNING
OUTCOME: 2
RATIONALE: An enterprise portal is an internal Web site that provides
proprietary corporate information to a defined user group.
Title: ANSWER: A REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
37. Which type of information systems is used by both operational
managers and middle managers?
October 22, 2018 10
A. off-line
B. on-line
C. auxiliary
D. batch
E. groupTitle: ANSWER: B REFERENCE: Management Information Systems LEARNING OUTCOME: 3 40. Processing data as they become available is called _____ processing.
Title: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3
RATIONALE: A data warehouse is an organization’s management support system that combines many databases to improve management decision making.42. In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic. Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited. All of the customer information gathered was stored in a(n):
Title: ANSWER: A REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
44. Data warehouses may contain many _____, subsets of a data warehouse
that each deal with a single
area of data.
46. Victoria Secret maintains a large data warehouse in which it
keeps track of inventory, buying patterns, and regional differences. An
examination of information from a data warehouse subset that contained
data from its Miami, Florida, stores showed that for every one black bra
purchased ten ivory bras were purchased. This subset is referred to as
a(n):
A. data mart
B. information network
C. data mine
D. information cluster
E. data nugget
Title: ANSWER: B REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
47. A system that collects and stores the company's key data and
produces the information needed by managers for analysis, control, and
decision making is called a(n):
A. office automation system
Title: ANSWER: A REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
49. If a manager needs a reporting system that provides the ability to
ask "what if" questions, he or she would probably install a(n) _____
system.
A. decision support
B. transaction processing
C. operating
D. expert
E. information reporting
A. transaction processing system
B. decision support system
C. information reporting system
D. expert system
E. office automation system
Title: ANSWER: B REFERENCE: Management Information Systems LEARNING
OUTCOME: 3
52. Cerner Corporation has created a(n) ______ that helps emergency room
physicians make decisions
suggestions as to possible treatments.
A. transaction processing system
B. decision support system
C. information reporting system
D. expert system
E. office automation systemTitle: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3
54. A(n) _____ is a management support system that is customized for an individual executive. It provides specific information for strategic decision making.A. decision support system
B. expert system
C. information automated system
D. executive information system
E. management database systemTitle: ANSWER: D REFERENCE: Management Information Systems LEARNING OUTCOME: 3 RATIONALE: An expert system replaces human consultants.
57. Academic advisement is unevenly provided in many high schools and colleges. There is a plan to provide advice to high school students and to college freshmen that are seeking a potential major. The on-demand consultation gathers information about a student's grades, interests, test scores, interests and aptitudes. It assesses student qualifications for a variety of majors. The _____ will then recommend six majors for them to consider and provides further information sources about the major.
A. office automation system
B. information reporting system
C. expert system
D. data channel
E. transaction communications system
Title: ANSWER: C REFERENCE: Management Information Systems LEARNING
OUTCOME: 3 59. Office automation decisions are specifically designed
to:
A. replace costly experts
B. analyze databases
C. improve organizational communications
D. maintain organizational culture
E. make decisions with a higher degree of certainty
Title: ANSWER: A REFERENCE: Technology Management and Planning
LEARNING OUTCOME: 4
61. _____ management focuses on gathering and sharing an organization’s
collective knowledge to improve productivity and foster innovation.
A. Knowledge
B. Entrepreneurial
C. Creative
D. Information
E. Productivity
D. data mining
E. information screening
Title: ANSWER: B REFERENCE: Technology Management and Planning LEARNING OUTCOME: 4 63. Which of the following statements about knowledge management is true?
E. All of the above statements about knowledge management are true.
Title: ANSWER: E REFERENCE: Technology Management and Planning
LEARNING OUTCOME: 4 64. A good technology plan provides employees with
the tools they need to perform their jobs at the highest levels of
efficiency. The first step in developing a good technology plan
is:
A. a situational analysis
B. budgeting
C. the establishment of rules and regulations
D. brainstorming
E. a general needs assessment
C. What are the company’s priorities, both short-term and long-term?
D. How can technology help the company solve its problems?
A. unauthorized access
B. chat rooms
C. sexual innuendoes expressed through lewd humor
D. biometrics
E. consumer privacy
October 22, 2018 16
Title: ANSWER: C REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 71. Copying of software programs by people who haven't paid for them is called:
A. unfair access
B. software shrinkage
C. software piracy
D. technological turnover
E. hardware sabotageTitle: ANSWER: D REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5
72. A computer program that copies itself into other software and can spread to other computer systems is called:
A. computer guerrilla activity
B. a computer vindication
C. a software infestation
D. a computer virus
E. a computer breachTitle: ANSWER: A REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 74. How does unsolicited and unwanted e-mail pose a security risk to companies?
A. Viruses spread through e-mail attachments.B. Hackers enter systems through e-mail.
A. privacy management, virus suppression, and enterprise portals
B. grid computing, on-demand computing, and real-time computing
C. digital forensics, the distributed workforce, and grid computing
D. knowledge management, privacy management, and intranets
E. privacy management, enterprise warehouses, and knowledge managementTitle: ANSWER: C REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6
76. The idea behind _____ is the need that criminal investigators have for examining evidence on computer hard drives such as in e-mails or databases in order to build cases against embezzlers and others.Title: ANSWER: A REFERENCE: Trends in Information Technology LEARNING OUTCOME: 6
October 22, 2018 18
FILL-IN-THE-BLANK QUESTIONS
Title: ANSWER: Information technology REFERENCE: Principles of
Information Technology LEARNING OUTCOME: 1
1. _____ is the equipment and techniques used to manage and process
information.
Title: ANSWER: Virtual private networks (VPNs) REFERENCE: Linking Up:
Computer Networks
6. _____ are private corporate networks connected over a public network,
like the Internet, that include strong security measures which allow
only authorized users to access the network.
LEARNING OUTCOME: 2
Title: ANSWER: online or real-time REFERENCE: Management Information Systems LEARNING OUTCOME: 3 9. When data are processed upon receipt and immediately put into the data-processing system, the firm is using a(n) _____ processing system.
Title: ANSWER: data warehouse REFERENCE: Management Information Systems LEARNING OUTCOME: 3 10. A ____ is any information technology that combines many databases across an entire company into one central database that supports management decision making.
Title: ANSWER: Data mining REFERENCE: Protecting Computers and Information LEARNING OUTCOME: 5 15. _____ is a sophisticated database application that looks for hidden patterns in a group of data to help track and predict future behavior.
SHORT ANSWER QUESTIONS