Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Student: ___________________________________________________________________________
m m m m
h.co h.co h.co h.co h.c om
b - b b- b b - b -b b-b
o uo and figures that can uoused for managerial decision ob o
w w.u1. Data are the processed
w w.facts w w.be w.u making. w.u
w True False w w ww w w
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
9. One disadvantage of technology is that it increases the number of corporate barriers.
.com
True False
h .com
h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
10. Technology has increased the number of consumer complaints in business.
.com
True False
h .com
h .com h h.com h.c om
.uo b-b .uo b-b o b-b ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
19. The proper management of information is the core of most companies' business.
.com
True False
h .com
h .com h.c om .c om
b-b b-b -bh b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
20. Information usefulness is based on six characteristics.
.com
True False
h .com
h h .com h.com h.c om
.uo b-b .uo b-b o b- b
ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w
m
o the technology used hto.cobtain
o m m m m
- b h.cis
23. Wi-Fi - b - b h.co without having to-bconnect
an Internet connection h.co to a phone line or-bh.co
ob ob ob ob ob
ww.ucable line. w w.u w w.u w w.u w w.u
w True False w w w w
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
28. A gateway is an entry point into a Web site.
.com
True False
h h .com h.co
m
h.c om .c om
b-b b-b - b b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
29. Shareware is copyrighted but distributed to potential customers free of charge.
.com
True False
h .com
h .comh h.com h.c om
.uo b-b .uo b-b o b-b ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w
30. Public domain software is software that is free for the taking.
.com
True hFalse h.co
m
h.co
m
h.c om h.co
m
o b-b .uob
-b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
31. IBM is working on a solution to computer breakdowns called SMASH.
.com
True bhFalse bh.c
om
bh.c
om h.c om h.c om
.uob
-
.uob
-
.u ob- .uo b-b .uo b-b
w w w ww w w
w ww w ww ww
33. The Wi-Fi available in Panera Bread allows users with wireless laptops to connect to the Web.
.com
True-bhFalse bh .com b h .com b h.com h.c om
.uob .uob
- -
.uob
-
.uob .uo b-b
w w w w w
ww ww ww ww ww
44. To protect from viruses computerom users should practice "safe computing".
h .com h .c h .com h.c om .c om
True
ob- b False
ob- b b- b b-b b -bh
w.u w.u w .uo w.u
o
w .u o
w w ww ww ww ww
45. E-mail
h .coismprivate and secure.bh.com h.c om h.c om .c om
True b
ob- False ob- b-b b-b b -bh
w .u w .u w .uo w.u
o
w .u o
ww ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - ob- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
48. __________ is the processed and organized data that can be used for managerial decision making.
.com .com
________________________________________
h h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
49. __________ is the name for the business technology of the 1980s. Its role changed from supporting the
business.c m business. Technology
toodoing .comsuch as ATMs and .commail are examples.bh.com
voice .com
bh b h b h b h
ob- -
u________________________________________
uob uob
-
uob
-
uob
-
w. w. w. w. w.
ww ww ww ww ww
50. In the
h om the name given to
.c1990s h om technology wash.__________.
.cbusiness com .com
Its role because
h the way of doing h.com
b b b b b
.u ob-
business, ob-technology to help with
rather than just .using
u . u
-
obbusiness functions. .uob- . uob-
w w w w w
ww ________________________________________
ww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
o b -
.uo b-b o b-b ob- .uo b-b
w w.u56. The phenomenonwofwinformation overload in
w w.u
business w.u
is called __________. w
w w w ww ww
________________________________________
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
67. A(n) __________ is a private data network that creates secure connections or "tunnels", over regular
b com
Internet .lines.
h b h .com bh .com b h .com b h .com
- -
________________________________________ - - -
w .uob .uob
w .uob
w .uobw .uob w
ww ww ww ww ww
bh .comthat is copyrightedbbut
68. Software
h
m
.codistributed .com free of chargebhis.ccalled
to potential customers
b h om __________. h.com
ob- - - - -b
w. u________________________________________
uob
w. uob
w. uob w. uob w.
ww ww ww ww ww
69. IBM m
.cisoworking .co
on a solutionhto m
__________ .com called SMASH: bsimple,
with an approach .commany and .com
b h b b h h bh
ob-
.uself-healing. .uob
-
.uob
-
.uob
-
.uob
-
w w w w w
ww ________________________________________
ww ww ww ww
.c om h.co
m
h.c om h.com h.c om
ob -bh o b- b
o b-b o b-b
o b-b
w .u w.u w.u w.u w.u
w w w w
w is a piece of programming
71. A(n) __________ w w
w code inserted into otherwprogramming to cause some
w
unexpected and for the victim, usually undesirable, event.
________________________________________
m m
.c o h.co h.com .com h.c om
ob -bh ob - b b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww
72. Most e-mail travels over the Internet in __________ plain text, meaning that the information can be viewed
by anyone.om
h .c h .com
________________________________________
b b b h .com b h .com b h .com
o b- b- o b- .uo b- o b- o
w w.u w.u w w.u w.u
w ww ww ww ww
74. When
h om
.cevaluating .com consider __________.
data on the Internet,
h h .comHow reliable and free
h com error is the
.from h .com
b b b b b
ob-
information?
.uob
-
.u________________________________________ .uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww
h om __________ of U.S.
77. More.cthan
h om
.ccompanies scan employee
h om regularly and legally.
.ce-mail h.com h.c om
b b b b b-b
ob- -
u________________________________________
uob uob
-
uob
- o
w . w . w. w. w.u
ww ww ww ww w w
78. In the
h om business technology
.c1970s h
m known as _________________.
.cowas h .com h .com h.co
m
- b - b - b - b - b
w.uA.obData processing w.uob w .uob w .uob w .uo b
ww B. Information systems
ww ww ww ww
C. Data analysis
D. Information technology
b h .com b h.com bh.co
m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
79. __________ is/are raw, unanalyzed and unorganized facts and figures.
A. Information
b h .com
B. Spreadsheets bh .com b h .com b h .com h.c om
-
.uC.obData .uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww D. Numeracy ww ww ww ww
b h .com systems
B. Information
b h .com b h .com bh .com h.com
- analysis
C. Data
.uD.obInformation technology
.uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
83. Blackberries or wireless laptop computers encourage __________ or independence of location.
b .com
A. Virtualization
h b h .com bh .com b h .com b h .com
-
B. Instant messaging - - - -
w .uC.obWi-Fi w.uob w .uob w .uob w .uob
ww ww ww ww ww
D. Viral marketing
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
89. Usefulness is based on four characteristics: quality, completeness, timeliness and
.com
______________________.
h h .com h .com h .com .c om
- b
A. Accuracy - b - b - b -bh
w .uB.obLots of information w.uob w .uob w .uob w .u ob
ww ww ww ww ww
C. Quick retrieval
D. Relevance
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
90. Hardware includes ______________________.
A. Computers
B. Pagers
b h .com b h.com b h .com h.c om h.co
m
-
.uC.obIPods .uob
-
.uob
- o b-b .uo b- b
w w w w.u w
ww D. All of the aboveww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
o b - o b-b o b-b ob- .uo to b-b
w w.u94. A(n) __________wprevents
w.u outsiders from accessing
w w.u corporate information
ww.uthe user does not want
w wothers
w see.
w w w w
A. Intranet
bh .com
B. Firewall
h.c om h .com h.co
m
h.com
-
C. Extranet
.uD.obCastlewall .uo b-b .uo b- b
o b - b
.uo b-b
w w w w w.u w
w ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
95. Just as phone companies provide secure shared resources for voice messages, __________ provide the same
m om om om om
bh.co h.c h.c bh.c h.c
o b - b-b
.uo the Internet in __________
o b-b ob- o b-b
w w.u100. Most e-mail travels
w wover w w.u plain text, meaning
w
u the information being
w.that w w.usent is
w w w
not in a secret code and anyone can view it.
w w
A. Completely
bh .com
B. Unencrypted
b h .com b h .com bh.co
m
h.com
-
C. Uncoded
.uD.obPure .uob
-
.uo b- o b -
.uo b-b
w w w w w w.u w
w w ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
101. A(n) __________ is a piece of information sent by a Web site over the Internet to your Web browser that
the browser
b h .com b h om back to the serverhwhenever
is expected to save and.csend
b .com the user returnsb h
to om Web site.
.cthat b h .com
-
A. Danish - - - -
w .uB.obRetro w .uob w .uob w .uob w .uob
ww ww ww ww ww
C. Cookie
D. Candy
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
102. Which of the following statements about government security is correct?
A. Today most government officials are worried about hackers and credit card fraud
b h .com agencies need only
B. Government
b h om government computers
.csecure b h .comto secure the country
b h .com bh.co
m
- b- - - -
w.uC.obTechnology workersware
.uoreluctant .uob to the governmentw.uob
to give information
w w .uo b
ww D. All of the abovewstatements
w are correct ww ww ww
om om om .com om
bh.c three ways that information
104.-Explain -bh
.c
-bh
.c business.
technology is changing
b- b h
b-b
h.c
w .uob w .uob w .uob w .uo w .uo
ww ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww
b .com information, we
105. Inhmanaging
b h comto know what is useful
.have b h
m what is not useful. .Describe
.coand b h com the four b h .com
ob-
.ucharacteristics .uob
of usefulness. -
.uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
.uob -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
106. Explain the difference between shareware and freeware.
h.c om h.c om h.co
m
h.c om .c om
b-b b-b - b b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
6. (p. 362) Virtualization is accessibility through technology that allows business to be conducted anywhere at any
time. .com .com .com .com .com
b h b h bh b h b h
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #6
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
7. (p. 362) Instant messaging is not used in business; it is a personal communication tool.
FALSE m m m
h.c o h.co h.c o h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #7
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #8
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts
com
. 11.2) One disadvantage
bhFigure . com h. bh. com . com com
9. (p.
o b -362; ob -bh of technology is that
o b -itbincreases the number of
o b -corporate barriers.
o b -bh
.u .u .u .u .u
w ww FALSE ww w ww w ww www w
m om om om om
h.co
Dias - Chapter 11 #9
b -bh
.c h.c h.c -bh
.c
.uob
- b
Learning Goal: Explain information technology's role in business
.u o .uo b-b o b-b ob
ww
Level of Learning: Understands concepts and principles
w w w.u w .u
w ww ww ww ww
Rationale: Figure 11.2 states that technology is breaking down corporate barriers, allowing functional departments or product groups (even factory workers) to share
critical information instantly.
com
h. Figure 11.2) Technology -has com
bh.increased the numberb-of .
bhconsumer com
h. com .c om
10.b(p.-b362;
o o b o
complaints bin-bbusiness.
o ob -bh
.u .u .u .u .u
w ww FALSE www ww w ww w ww
w
m om om om om
h.co
Dias - Chapter 11 #10
b h.c h.c bh.c h.c
- b-b
Learning Goal: Explain information technology's role in business
.uo b .uo .uo b-b ob- .uo b-b
w Level of Learning: Understands concepts and principles
w w w.u w
ww ww ww ww ww
Rationale: Figure 11.2 states that customer service representatives can solve customers' problems instantly by using companywide databases to complete tasks from
changing addresses to adjusting bills. Information gathered from customer service interactions can further strengthen customer relationships.
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
11. (p. 362; Figure 11.2) Technology eliminates layers of management.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #11
Learning Goal: Explain information technology's role in business
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: Figure 11.2 states that technology eliminates layers of management and cuts the number of employees. Companies use computers and telecommunication
b b b b h.c
.uo b -
.uo b- o
equipment to create "virtual offices" with employees in various locations. b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
12. (p. 364) The phenomenon of reading papers and reports online is known as infoglut.
FALSE .com om om om m
- bh bh.c bh.c bh.c bh.co
.uob .u ob- .uob
- ob- .uo b-
w w ww w w w.u w
w w w ww ww
Dias - Chapter 11 #12
Learning Goal: Understand how information is managed
.com .com m om om
Level of Learning: Knows basic terms and facts
b h b h bh.co h.c h.c
o b- o b- o ob- o b-b b-b
w w.u ww.u w w.u w w.u w w.u
w w
13. (p. 365) A data warehouse contains historicalwpaper-based informationw w
prior to scanning it for electronic
storage.
FALSE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
Dias - Chapter 11 #13
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
16. (p. 365) The more information provided the better it is.
FALSE .com .com m om om
h h h.co h.c -bh
.c
.uo b-b o b-b .uob
- b
o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #16
Learning Goal: Understand how information is managed
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- ob- o b-b
w w.u w w.u w w.u w.u w.u
w w for information provided
17. (p. 365) It is important ww at hand.
w to be relevant to the issue w w
TRUE
.c om h.co
m
h.c om h.c om h.c om
-bh
Dias - Chapter 11 #18
ob b- b b-b b-b b-b
w
Learning Goal: Understand how information is managed
.u w .uo w.u
o
w.u
o
w .uo
ww ww
Level of Learning: Knows basic terms and facts
ww ww ww
19. (p. 365) The proper management ofoinformation is the core ofomost companies' business.om
TRUE b h .com bh .c m b h .c m h.c h.c om
.uob- b- .uo b- .uo b-b .uo .uo b-b
w w w w w
ww ww ww ww ww
Dias - Chapter 11 #19
m om om om om
h.co
Learning Goal: Understand how information is managed
.c h.c h.c .c
b -bh
Level of Learning: Understands concepts and principles
- b-b b-b -bh
.uob .u ob .uo w.u
o
Rationale: The importance of information management cannot be overemphasized. For most companies, the proper management of information is the core of their
.u ob
w ww business.
ww
w
ww
w
ww ww
w
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
21. (p. 366) In Internet retail, data mining is called shopping cart analysis.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #21
Learning Goal: Understand how information is managed
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h h.c
Rationale: In Internet retail, data mining is called shopping cart analysis. Using shopping cart analysis, a manager can see what items people buy together and as a
b b b b
.uo b -
.uo b-
result make recommendations on product placement. o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
22. (p. 368) Wireless networking refers to the technology used to obtain an Internet connection without having to
connect .to
b h coamphone line or cablebline.
h.com b h .com b h .com b h .com
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #22
.com .com
Learning Goal: Describe various types of software and hardware
b h b h bh.co
m
h.c om h.c om
.uo b- o b-
Level of Learning: Knows basic terms and facts
.uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
23. (p. 368) Wi-Fi is the technology used to obtain an Internet connection without having to connect to a phone
line or cablemline.
TRUE b h .co bh .com b h .com b h .com b h .com
-
ob - - - -
w.u w .uob w.u
ob
w.u
ob
w .uob
ww ww ww ww ww
Dias - Chapter 11 #23
om .com
Learning Goal: Describe various types of software and hardware
.c h.c om .com h.c om
-bh h h
Level of Learning: Knows basic terms and facts
b b-b b b-b
ob ob- .uo .uo b- .uo
w.u w.u w w w
ww ww ww ww ww
24. (p. 369) An intranet consists of hardware and software that prevents outsiders from accessing information the
user does not want others to see.
m m m m m
FALSE h.co
-b h.co -b h.co -b h.co h.co -b -b
.uob w.u
ob
w.u
ob
w.u
ob
w.u
ob
www w w ww w w w w
Dias - Chapter 11 #24
Learning Goal: Describe various types of software and hardware
om
Level of Learning: Knows basic terms and facts
h.c h .com h.c om h.c om .c om
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o .u o
ww ww ww w w w ww
25. (p. 369) An intranet is a companywide network, closed to public access that uses Internet-type technology.
TRUE
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww Dias - Chapter 11 #25 ww
Learning Goal: Describe various types of software and hardware
ww ww ww
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
26. (p. 370) An extranet is a semiprivate network that uses Internet technology and allows more than one company
to access.cthe
h omsame information orhallows
.com people on different h com to collaborate. bh.com
.servers h .com
b b b b
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #26
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
27. (p. 371) A virtual private network is a private data network that creates secure connections or "tunnels" over
regular Internet m lines.
TRUE b h . c o
b h.com b h .com b h .com bh .com
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uob
w w ww ww ww ww
Dias - Chapter 11 #27
.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
28. (p. 371) A gateway is an entry point into a Web site.
FALSE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww Dias - Chapter 11 #28 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts
o m o m .cotaking. m om om
h.cPublic
30. (p.b374) domain softwareb his.csoftware that is free for
b hthe h.c -bh
.c
ob
.uTRUE
-
.uob
-
.uob
- o b-b ob
w w w w.u w .u
ww ww ww w w ww
m om om om om
h.co
Dias - Chapter 11 #30
h.c
Learning Goal: Describe various types of software and hardware
b h.c bh.c h.c
.uo b -
.uo b-b
Level of Learning: Knows basic terms and facts
.uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
31. (p. 368) IBM is working on a solution to computer breakdowns called SMASH.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #31
Learning Goal: Describe various types of software and hardware
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: IBM is working on a solution to computer breakdowns with an approach called SMASH: simple, many and self-healing. The hope is to build computers
b b b b h.c
.uo b -
.uo b- o b-
made of many small components that have the ability to monitor their own performance and solve problems. ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
32. (p. 368) Wireless networking has set the common PC free from cords.
TRUE .com .com .com om m
h -bh h h.c h.co
o b-b .uob .uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #32
Learning Goal: Describe various types of software and hardware
.com .com m om om
Level of Learning: Understands concepts and principles
b h b h h.co h.c
Rationale: Wireless networking refers to the ability of a computer or device to transport signals through the air and without cords.
b h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
33. (p. 368) The Wi-Fi available in Panera Bread allows users with wireless laptops to connect to the Web.
TRUE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww Dias - Chapter 11 #33 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
om .com om .com
Rationale: Wi-Fi or wireless fidelity is the technology used to obtain an Internet connection without having to connect to a phone line or cable line. This is available in
.c h.c h.c om
-bh h h
Panera Bread and other restaurants.
b b-b b b-b
ob ob- .uo .uo b- .uo
w.u w.u w w w
ww ww ww ww ww
34. (p. 371) A VPN allows a company to have privacy and security in its network.
TRUE
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #34 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines. Companies can use
h.c om .com h.c om h.c om
public lines securely. VPNs provide secure sharing of public resources for data and allow for on-demand networking: an authorized user can join the network for any
h .c om
b-b b- b b-b
desired function, at any time, for any length of time, while keeping the corporate network secure. b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
35. (p. 371) It is important to find the right software before finding the right hardware.
TRUE om om om om om
h.c h.c h.c bh.c h.c
.uo b-b .uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
Dias - Chapter 11 #35
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
36. (p. 372) A healthcare provider might use an expert system to diagnose a skin problem experienced by someone
b .com
in her early
h
20s.
b h .com bh .com b h .com b h .com
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #36
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Understands concepts and principles
.uo b .uo o b- ob- o b-b
w w.u w.u w.u
Rationale: An expert system is a type of software that is meant to solve problems in a variety of industries. The doctor would input the symptoms and the possible issues
w
ww would then be viewable. ww w w ww w w
h .com
Dias - Chapter 11 #37
b b h.com bh.co
m
h.c om h.c om
b- b-
Learning Goal: Discuss challenges in information technology
.uo o .uo b-
.uo b-b .uo b-b
w w.u
Level of Learning: Knows basic terms and facts w w w
ww w w ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
41. (p. 378) Computer viruses can often cause instability in technology.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #41
Learning Goal: Discuss challenges in information technology
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- ob- o b-b
w w.u w w.u w w.u w.u w.u
w w
42. (p. 379) All the information w
found online is reliable. ww w w
FALSE
.c om h.co
m
h.c om h.c om h.c om
-bh
Dias - Chapter 11 #43
ob b- b b-b b-b b-b
w
Learning Goal: Discuss challenges in information technology
.u w .uo w.u
o
w.u
o
w .uo
ww ww
Level of Learning: Understands concepts and principles
ww ww ww
Rationale: Hackers are people who break into computer systems for illegal purposes, such as transferring funds from someone's bank account to their own without
authorization. One ongoing problem with computer technology, which is likely to persist in the future is that computers are susceptible to hackers.
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
b-b b-b
Dias - Chapter 11 #44
-
.uob ob
Learning Goal: Discuss challenges in information technology
.u .uo w.u
o .u ob
w ww ww
w
Level of Learning: Understands concepts and principles
ww
w
ww ww
w
Rationale: Computer users should keep their antivirus protection program up-to-date and, more important, practice "safe computing" by not downloading files from
unknown sources and by scanning file storage devices, such as CDs and USB flash drives, before accessing any of the files on them.
m om om om om
h.co
Dias - Chapter 11 #45
b h.c h.c bh.c h.c
.uo b -
.uo b-b
Learning Goal: Discuss challenges in information technology
.uo b-b ob- .uo b-b
w w
Level of Learning: Understands concepts and principles w w.u w
ww ww ww ww ww
Rationale: E-mail is no more private than a postcard. You do not need to be the target of a criminal investigation to have your e -mail reviewed by someone in your
company or in your personal life. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
46. (p. 359) The name for business technology in the 1970s was __________. Its primary purpose was to improve
the flow.of m
cofinancial information. .com .com .com .com
b h b h bh b h b h
ob- processing
data ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #46
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
47. (p. 359) Raw, unanalyzed and unorganized facts and figures are called __________.
data m m m
h.c o h.co h.c o h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #47
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
b h .com bh.co
m
h.com h.c om h.c om
ob- -Chapter 11 #48
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts
com
h. __________ is the name . com . com
h. com
. com
49.b(p.-b359)
o o b -bh for the business technology
o b-bh of the 1980s. Its role
o b -bchanged from supporting
o b -bh
w.uthe business to doing w w.u Technology suchwas
business. u
w.ATMs w.u
and voice mailware examples. w.u
ww Information systems w w w ww
m m m m m
h.cIno the 1990s the name-bgiven
50. (p.b361)
- h.co to business technology
- b
o __________. Its role
h.cwas - b
o
h.cbecause the way of bh.co
-
ob business, rather than
.udoing b using technology to.uhelp
.uojust ob with business functions.
.uob .uob
w w w w w
ww Information technology ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
51. (p. 362) __________ is accessibility through technology that allows business to be conducted anywhere at any
time. .com .com .com .com .com
b h b h bh b h b h
ob-
Virtualization ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #51
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
52. (p. 362) __________ allows businesses to communicate in real time, for free, via computer.
Instant messaging
m m m m m
h.c o h.co h.c o h.c o h.co
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #52
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #53
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts
com
h. Selling products or services
. com . . com com h.c om
54.b(p.-b363)
o o b -bh online through e-business
o b-bh is called __________.
o b -bh b-b
.u .u .u .u .uo
www e-commerce ww w ww ww
w w ww
w
m om om om om
h.co
Dias - Chapter 11 #54
b -bh
.c h.c h.c -bh
.c
.uob
- b
Learning Goal: Explain information technology's role in business
.u o .uo b-b o b-b ob
ww
Level of Learning: Knows basic terms and facts
w w w.u w .u
w ww ww ww ww
55. (p. 364) Any business participating in e-__________ is engaging in e-__________.
om om om om om
bh.c business
commerce;
- bh.c bh.c bh.c -bh
.c
.uob .u ob- .u ob- .uob
-
.u ob
w w ww ww ww w
w w w w ww
Dias - Chapter 11 #55
Learning Goal: Explain information technology's role in business
m om om om om
h.co h.c
Level of Learning: Understands concepts and principles
b h.c bh.c h.c
- b-b b-b ob- b-b
Rationale: Any business participating in e-commerce is engaging in e-business, while a business may engage in e-business without necessarily doing e-commerce.
.uo b .uo .uo .uo
w w w w.u w
ww ww ww ww ww
56. (p. 364) The phenomenon of information overload in business is called __________.
infoglut om om om m om
h.c h.c h.c h.co h.c
.uo b-b .uo b-b .uo b-b o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
Dias - Chapter 11 #56
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
57. (p. 365) A(n) __________ stores data on a specific subject over a period of time.
.com
data warehouse
h .com h .com h.c om .c om
b-b b-b -bh b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
Dias - Chapter 11 #57
Learning Goal: Understand how information is managed
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- o ob- b-b
w w.u w w.u w w.u w w.u w w.u
w w is looking for hidden patterns
58. (p. 365) __________ w in the data in a datawwarehouse and discovering
w
relationships among the data.
Data mining m
h.c o h.com h.c om h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #58
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #59
.uDias .uo b- o b-b o b-b .uo b-b
w w w.u w.u w
ww w
w information is managed
Learning Goal: Understand how ww ww ww
Level of Learning: Knows basic terms and facts
com
h. To manage information, . com bh. four characteristics: bh. com . com com
60.b(p.-b365)
o ob -bhusefulness is based oon
b-these o b -__________, o b -bh
completeness,
w.utimeliness and relevance.w.u w.u w.u w.u
ww quality ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
62. (p. 368) The technology used to obtain an Internet connection without having to connect to a phone line or
cable line
h om
.cis called __________. .com
h h .com h .com h .com
b b b b b
ob- fidelity (Wi-Fi) ob-
wireless ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #62
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
63. (p. 369) A(n) __________ is a companywide network, closed to public access that uses Internet-type
technology. m
intranet
b h .co b h.com b h .com b h .com bh.co
m
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uo b
w w ww ww ww ww
Dias - Chapter 11 #63
.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
64. (p. 369) A(n) __________ can consist of hardware or software and prevents outsiders from accessing
information the user does not want others to see.
m m m m om
firewall
-b h.co h.co h.co h.co h.c
.uob .uo b-b o b-b o b-b .uo b-b
w w w.u w.u w
ww ww ww ww ww
Dias - Chapter 11 #64
Learning Goal: Describe various types of software and hardware
om .com
Level of Learning: Knows basic terms and facts
.c h.c om .com h.c om
ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww
65. (p. 370) A(n) __________ is a semiprivate network that uses Internet technology and allows more than one ww
company to access the same information or allows people on different servers to collaborate.
extranet com com com com om
. . h. h. .c
ob -bh ob -bh b-b b-b b -bh
.u .u .uo w.u
o .u o
www ww
w
ww
w
ww ww
w
Dias - Chapter 11 #65
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts
h.c om h .com h.c om h.c om .c om
o b-b o b- b
o o b-b b-b ob -bh
w w.u w w.u w w.u w w.u w .u
w 66. (p. 370) __________
w are people who break into
w computer systems for w
illegal purposes. ww
Hackers
m om om om om
bh.co h.c h.c bh.c h.c
o
.uDiasb - o b-b o b-b ob- .uo b-b
w - Chapter 11 #66 w.u w.u w.u w
ww w
w types of software and hardware w
Learning Goal: Describe various
w ww ww
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
67. (p. 371) A(n) __________ is a private data network that creates secure connections or "tunnels", over regular
b com
Internet .lines.
h b h .com bh .com b h .com b h .com
ob- private network ob-
virtual ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #67
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
68. (p. 372) Software that is copyrighted but distributed to potential customers free of charge is called
__________.m
shareware
b h .co b h.com b h .com b h .com bh.co
m
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uo b
w w ww ww ww ww
Dias - Chapter 11 #68
.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
69. (p. 368) IBM is working on a solution to __________ with an approach called SMASH: simple, many and
self-healing.
m m m m om
computer
-b h.cobreakdowns h.co h.co h.co h.c
.uob .uo b-b o b-b o b-b .uo b-b
w w w.u w.u w
ww ww ww ww ww
Dias - Chapter 11 #69
Learning Goal: Describe various types of software and hardware
om .com
Level of Learning: Understands concepts and principles
.c h.c om .com h.c om
-bh ob-
bh
b-b b- b h
Rationale: IBM is working on a solution to computer breakdowns with an approach called SMASH: simple, many and self-healing. The hope is to build computers
ob b-b
w.u w.u .uo
made of many small components that have the ability to monitor their own performance and solve problems.
w w .uo w .uo
ww ww ww ww ww
70. (p. 368) The technology that allows you to connect your laptop to the Internet in a hotel, an airport or Panera
Bread is
b h com __________. bh.com
.called b h .com b h .com b h .com
ob- (wireless fidelity).uob-
.uWi-Fi .uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww
.com
Dias - Chapter 11 #71
bh h.c om h .com h.co
m
h.c om
.uo .uo b-b
Learning Goal: Discuss challenges in information technology
b-
Level of Learning: Knows basic terms and facts
.uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
72. (p. 377) Most e-mail travels over the Internet in __________ plain text, meaning that the information can be
viewed by m
.coanyone. .com .com .com .com
b h b h bh b h b h
ob-
unencrypted ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #72
m .com .com .com om
bh.co
Learning Goal: Discuss challenges in information technology
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
73. (p. 377) Web sites often send __________ to your computer that stay on your hard drive.
cookies m m m m m
h.c o h.co h.c o h.c o h.co
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #73
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
77. (p. 376) More than __________ of U.S. companies scan employee e-mail regularly and legally.
one-fourth
h .com .com h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
Dias - Chapter 11 #77
Learning Goal: Discuss challenges in information technology
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: E-mail is no more private than a postcard. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.
b b b b h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
78. (p. 359) In the 1970s business technology was known as _________________.
A. Data processing
b .com systems
B. Information
h b h.com b h .com b h .com bh.co
m
- - - - -
w.uC.obData analysis w .uob w .uob w .uob w .uo b
ww D. Information technologyww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
81. (p. 359) In the 1980s business technology was known as _____________________.
com
A. Data .processing
h h .com h .com h .com .c om
- b
B. Information systems - b - b - b -bh
w .uC.obData analysis w.uob w .uob w .uob w .u ob
ww ww ww ww ww
D. Information technology
om
h.cIn the 1990s business-btechnology
82. (p.-b361) h.c om .c
then became known .c om om h.co
m
o b ob o b -bh as _________________.
o b -bh b- b
w.uA. Data processing ww.u w.u w.u w .uo
ww B. Information systems w ww ww ww
C. Data analysis
D. Informationom technology om om om om
h.c h.c h.c h.c h.c
.uo b-b o b-b .uo b-b .uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
Dias - Chapter 11 #82
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
.u uo
w.wireless
w 83. (p. 362) Blackberrieswor
o
w.uencourage __________
o
wor.uindependence of location.
w.u
o
w w w laptop w
computers
w w w w w
A. Virtualization
B. Instant messaging
C. Wi-Fi
b h .com bh .com h.c om h.com h.c om
-
.uD.obViral marketing ob- .uo b-b .uo b- b
.uo b-b
w w.u w w w
ww ww ww ww ww
m
Dias - Chapter 11 #83
om om om om
h.co -bh
.c
Learning Goal: Explain information technology's role in business
b h.c h.c -bh
.c
.uob
- ob
Level of Learning: Understands concepts and principles
.u .uo b-b o b-b ob
ww w w w.u w .u
Rationale: Virtualization is accessibility through technology that allows business to be conducted anywhere at any time. For example, you can carry a virtual office
w ww ww
using such tools as Blackberries or wireless-enabled laptop computers. ww ww
.com om .com m om
Rationale: Instant messaging (IM) allows business professionals to participate in multiple conversations at once. The advanta ge to IM in business is that IM is
h h.c h h.co
immediate, even more so than e-mail and there is no additional incremental cost, which makes overseas communication easier and cheaper.
b h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
85. (p. 364) Information overload in business is also called ____________________.
A. Infoglut
h .com h .com h .com h .com .c om
- b
B. Infoquan - b - b - b -bh
w .uC.obInfosum w .uob w .uob w .uob w .u ob
ww ww ww ww ww
D. Overinfo
om
h.cA(n) __________ stores
86. (p.-b365) .c om .c om .c om h.co
m
o b ob -bh data on a specific subject
o b -bhover a period of time.
o b -bh b- b
w.uA. Data handler w.u w.u w.u w .uo
ww B. Info handler ww ww ww ww
C. Info warehouse
D. Data warehouse
om om om om om
h.c h.c h.c h.c h.c
.uo b-b o b-b .uo b-b .uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
Dias - Chapter 11 #86
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
.c om h.co
m
h.c om h.c om h.c om
ob -bh o b- b b-b b-b b-b
.u .uo
w.u for hidden patternswinwthe
w 87. (p. 365) __________wlooks
o o
w.u and discovers relationships
w.u
w w w w data in a data w
warehouse
w w w
among the data.
A. Data deciphering
b com
B. Datah.patterning
bh .com h.c om h.com h.c om
-
.uC.obData mining .uob
-
.uo b-b .uo b- b
.uo b-b
w w w w w
ww D. Data development ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
Dias - Chapter 11 #87
.u ob .uo b-b o b-b ob
ww
Learning Goal: Understand how information is managed
w w w.u w .u
w ww
Level of Learning: Knows basic terms and facts
ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
89. (p. 365) Usefulness is based on four characteristics: quality, completeness, timeliness and
.com
______________________.
h h .com h .com h .com .c om
- b
A. Accuracy - b - b - b -bh
w .uB.obLots of information w.uob w .uob w .uob w .u ob
ww ww ww ww ww
C. Quick retrieval
D. Relevance
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww Dias - Chapter 11 #89 ww w w ww w w
Learning Goal: Understand how information is managed
Level of Learning: Understands concepts and principles
Rationale: Usefulness is based on four characteristics: quality, completeness, timeliness and relevance.
h.c om h.com h.c om h.c om h.co
m
o b-b .uob
- b
o b-b o b-b .uo b- b
w w.u90. (p. 367) Hardware includes
w w w.u
w ______________________. w.u w
w w w ww ww
A. Computers
B. Pagers
C. IPods
b h .com b h.com bh.co
m
h.c om h.c om
-
.uD.obAll of the above o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
om
Dias - Chapter 11 #90
.c h.co
m
h.c om h.c om h.c om
ob -bh
Learning Goal: Describe various types of software and hardware
b- b b-b b-b b-b
w .u w .uo
Level of Learning: Knows basic terms and facts
w.u
o
w.u
o
w .uo
ww ww ww ww ww
91. (p. 368) __________ refers to the ability of a computer or device to transport signals through the air.
A. Wireless
b h .comnetworking
bh .com b h .com b h.com b h .com
-
B. Wireless fidelity - - - -
w .uC.obWireless signaling w.uob w .uob w .uob w .uob
ww ww ww ww ww
D. Flexible wiring
om
h.cThe technology used -to
92. (p.-b368)
om
.c an Internet connection.c .c om .c om om
b b bhobtain b-bh without having to connect
b -bh to a phone line orb -bh
o o o o o
w.ucable line is called _____________________.
w.u w.u w.u w.u
ww A. Wireless networking ww ww ww ww
B. High-fidelity
C. Wireless fidelity
D. Free b h .com
networking b h .com b h .com b h .com b h .com
- - - - -
w .uob w .uob w .uob w.u
ob
w .uob
ww ww ww ww ww
Dias - Chapter 11 #92
.com om .com m om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b h.c h h.co h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
93. (p. 369) A(n) __________ is a companywide network closed to public access that uses Internet-type
technology.
b h .com b h .com bh .com b h .com b h .com
-
A. Extranet - - - -
w .uB.obIntranet w.uob w .uob w .uob w .uob
ww ww ww ww ww
C. Companet
D. Firewall
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww Dias - Chapter 11 #93 ww w w ww w w
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts
.c om
Dias - Chapter 11 #94
h.co
m
h.c om h.c om h.c om
ob -bh b- b
Learning Goal: Describe various types of software and hardware
b-b b-b b-b
w .u .uo
Level of Learning: Knows basic terms and facts
w w.u
o
w.u
o
w .uo
ww ww ww ww ww
95. (p. 371) Just as phone companies provide secure shared resources for voice messages, __________ provide the
same secure
b h .comsharing of public resources
bh .com for data. b h .com b h.com b h .com
- - - - -
w .uA.obVIPs w .uob w .uob w .uob w .uob
ww B. VPNs ww ww ww ww
C. EXNs
D. IMPs
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #95
ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
om .com om om
Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines. The idea of the VPN is to
h.c h h.c h.c .c om
give the company the same capabilities at much lower cost by using shared public resources, rather than private ones.
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
96. (p. 372 - 373) Which of the following statements about computer software is true?
A. An expert system is a type of software that only expert users are qualified to use
.comis not copyrightedband
B. Shareware
b h h .coismfree for the taking bh.com b h .com h.c om
-
.uC.obGroupware is software ob-allows people to work
.uthat b-
.uocollaboratively and share ob-
.uideas .uo b-b
w w w w w
ww D. All of the abovewstatements
w are true ww ww ww
om
h.cProgramming codes inserted
98. (p.-b375)
om
.c into other programming .c om
h.c are called .c om om
o b ob -bh o b -bh to cause unexpected
o b -bevents o b-bh
w.u________________________.
w.u w.u w.u w.u
ww A. Viruses ww ww ww ww
B. Beetles
C. Phishesom
h
D. Gorillas
b .c b h.com bh .com b h .com b h .com
- - - - -
w .uob w.u
ob
w .uob w .uob w .uob
ww w w ww ww ww
Dias - Chapter 11 #98
om m
Learning Goal: Discuss challenges in information technology
.c h.co h.c om h.c om h.c om
ob -bh
Level of Learning: Knows basic terms and facts
b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
99. (p. 376) What percentage of the systems the government needs to protect is in the private sector?
A. 10
B. 30 h.com h .com h .com h.com h .com
- b - b - b - b - b
w .uC.ob50 w .uob w .uob w .uob w .uob
ww D. 85 ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
Dias - Chapter 11 #99
.u ob .uo b-b o b-b ob
ww
Learning Goal: Discuss challenges in information technology
w w w.u w .u
w ww
Level of Learning: Knows basic terms and facts
ww ww ww
.com om .com m om
Level of Learning: Knows basic terms and facts
bh h.c h h.co h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
101. (p. 377) A(n) __________ is a piece of information sent by a Web site over the Internet to your Web browser
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
104. Explain three ways that information technology is changing business.
105. In managing
m information, we .have mto know what is useful and
m what is not useful. .Describe
m the four
.c o
characteristics of usefulness. -bh c o .c o c o h.c om
ob -bh -bh -bh b-b
w.u w .uob w.u
ob
w.u
ob
w .uo
ww ww ww ww
Quality: Quality means the information is accurate and reliable. Completeness: There must be enough ww
information to allow individuals to make a decision but not so much as to confuse the issue. Today, the problem
is often tooom
much information rather othan too little. Timeliness:oInformation must reach business owners and
managers
b h .cquickly. If informationbh .c mtoo long to pull upbith.may
takes
c m
be virtually useless,
b h.com a decision maybh.com
because
ob- have been made. .Relevance:
.ualready uob
-
Information systems
-
.uob often provide us with b-
.uotoo much data.
b-
.uoneed
Managers
w w w w w
ww to learn to ask the right
ww questions, in order to w w ww
get the relevant data they need. ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
107. List the information technology challenges of today.
h .com h .com h.co
m
h.c om .c om
b- b and viruses uob- b - b b-b -bh
w .u1.oHackers w. w .uob w.u
o
w .u ob
ww 2. Governmental securityww ww ww ww
3. Privacy
4. Stability
m .com .com .com om
h.co of data
5. Reliability h h h h.c
.uo b-b .uo b- b
o b- b
ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w
Dias - Chapter 11 #107
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
# of Category
Que
bh .com b h.com b h .com b h.com h.com
ob-
stio
.uob
- o b- ob- o b-b
w.uns w w.u w.u w.u
ww 107 Dias - Chapter 11
ww w w ww w w
32 Learning Goal: Describe various types of software and hardware
m Discuss challenges in information
coGoal: com technology .com om m
h.co
23 Learning
b h . b h. b h h.c
-
.u20obLearning Goal: Understand
28 Learning -
uob technology's role in business
Goal: Explain information
uob
- o b-b .uo b- b
w w .how w . w.u w
ww ww information is managed w
w ww ww
75 Level of Learning: Knows basic terms and facts
28 Level of Learning: Understands concepts and principles
m m m m m
- b
1
h.co A can
Rationale:
- b h.coVPNs
virtual private network (VPN)
- b co secure connections or "tunnels",
is a private data network that creates
hof.public - b h.cforoover regular Internet lines
- b h.co
ob. Companies use public ob
lines securely. provide secure ob
sharing resources for dataob
and allow on-demand ob
networking: a
w w.u n authorized user can join
w wthe.unetwork for any desired function,
w w.uat any time, for any length ofwtime,
w.uwhile keeping the corporatewnetwork
w.u sec
w ure. w w w w
1 Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines
. The idea of the VPN is to give the company the same capabilities at much lower cost by using shared public resources, rather than private
ones..com .com .com .com m
- b h - bh - b h - b h - b h.co
1obRationale: According to Mike McConnell,
b ob Security Agency, if 30.terrorists
former director of the National ob with hacker skills and $10 millio
ob
w.u n attacked the U.S. today, .uocould
wthey w.u
shut down entire communications, w uand transportation systems. ww.u
money supply, electricity
w w w w w w w w w
1 Rationale: Although many people looking to buy a computer think first of the equipment, it is important to find the right software before fin
ding the right hardware. Some programs are easier to use than others. Some are more sophisticated and can perform more functions than oth
ers.
.c om c om
of.software
om
.c in a variety of industries.bShareware
.c om
is copyrighted but disbh.c
om
b -bh to An
1
Rationale:
-ofbh
expert system is a type
b -thathallows people
that is meant to solvebproblems
b b - h and share -
w
o tributed potential customers
.u network and allows people w
o
free charge. Groupware is o
software
.inudifferent areas to work on thewsame to work
.u project at the same time. w.u o
collaboratively .uoonb a
ideas. It runs
w
w w w w w w ww w w
1 Rationale: An expert system is a type of software that is meant to solve problems in a variety of industries. The doctor would input the sym
ptoms and the possible issues would then be viewable.
1 Rationale:m
.coe-commerce. .com
Any business participating in e-commerce
.com
is engaging in e-business,
.co
while a business may engage in m
e-business without necessar
.com
b
ily
- h
doing - b h - b h - b h - b h
ob .uobkeep their antivirus protection ob .uob practice "safe computing" ob
w w.u1 Rationale: Computer users
w wshould w w.uprogram up-to-date and, more
w wimportant, w w.uby not
w w unknown sources and by scanning
downloading files from w file storage devices, such as CDs
w and USB flash drives, before accessing
w any of t
he files on them.
1 Rationale: E-mail is no more private than a postcard. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.
m m m m m
1 h.co E-mail is no more private-bthan
Rationale:
- b h.caopostcard. You do not need-b be.c
toh o target of a criminal investigation
the
- b h.coto have your e-mail review-bh.co
.uobed .uobor in your personal life. More
by someone in your company obone-fourth of U.S. companies.uscan
than
.u obemployee e-mail regularly and
.uo b
legall
w ww y. ww w ww w ww w ww w
1 Rationale: Figure 11.2 states that customer service representatives can solve customers' problems instantly by using companywide databases
to complete tasks from changing addresses to adjusting bills. Information gathered from customer service interactions can further strengthe
n customer relationships.
om
h.c Figure 11.2 states that technology
.c om om
.c cuts the number of employees. .c om .c om
1
o b
Rationale:
s
-band telecommunication o b
equipment
-btohcreateeliminates
"virtual offices" o
with b -bh and
layers of management
employees in various locations. o b -bh Companies use computer
o b -bh
w .u w.u w .u w .u .u w
ww 1 ww
Rationale: Figure 11.2 states that technology is breaking w corporate barriers, allowingwfunctional
wdown w w (even
wgroups
departments or product
factory workers) to share critical information instantly.
1 Rationale: Hackers are people who break into computer systems for illegal purposes, such as transferring funds from someone's bank accou
h om
nt to their own without authorization. Oneco
.csusceptible h
m problem with computer.technology,
. ongoing h com which is likely tobpersist h .coinmthe future is that computbh.com
- b
ers are to hackers. - b - b - -
w .u2obRationale: IBM is workingwon b
.uaosolution ob
w.u with an approach called SMASH:
to computer breakdowns
ob
w.u simple, many and self-healing.
b
uohop
w.The
ww w w w
w made of many small componentswthat have the ability to monitor their
e is to build computers
w
w own performance and solve problems.
w
1 Rationale: In Internet retail, data mining is called shopping cart analysis. Using shopping cart analysis, a manager can see what items people
buy together and as a result make recommendations on product placement.
m m m m .com
2 h.co In managing information, we
Rationale: co to know what is useful andhwhat
h.have .cois not useful. Usefulness is based
h.coon these four characteristic h
.uo b-b o b-b o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
s: quality, completeness, timeliness and relevance.
1 Rationale: m
.cisothat . soom
Instant messaging (IM) allowscbusiness
.coinmmultiple
professionals to participate m advantage to IM in bu .com
.coThe
conversations at once.
- b h
siness IM is immediate, even
- b h
more than e-mail and there is no
- b h
additional incremental cost, which
- b h
makes overseas communication-bh
w .uobeasier and cheaper. .uob .uob .uob .uob
ww 1 Rationale: Technology
ww www
w workers are reluctant to give information ww
w for increased protection forw
to the government in exchange
ww
fear that the pu
blic will find out about security breaches and lose faith in the company's ability to protect its assets and reputation.
1 Rationale: The importance of information management cannot be overemphasized. For most companies, the proper management of informa
h om
tion is.cthe core of their business.
h .com h .com h .com h.co
m
- b
1obRationale: U.S. companies are o - b -
b allowed to scan employee.ue-mailb - b - b
legally ob and about 25% of them do.uso.obMost e-mail travels over the Internet
ob i
w w.u n unencrypted text. ThewInternet
w.u allows Web surfers to access
w wall sorts of information about w wbusiness and individual Web w
both w.u
sites.
w w w w w
1 Rationale: Usefulness is based on four characteristics: quality, completeness, timeliness and relevance.
1 Rationale: Virtualization is accessibility through technology that allows business to be conducted anywhere at any time. For example, you c
am m om computers. om
b h . can carryo virtual office using such tools asoBlackberries
b h . c or wireless-enabled laptop
b h . c b h . c bh .com
-
1 Rationale: Wi-Fi or wireless fidelity- is the technology used to obtain - Internet connection without ohaving
an - to connect to a phone line orobcab-
w.uoble line. This is available inwPanera
.uobBread and other restaurants. w .uob w .u b w.u
ww 1 Rationale: Wirelessw w w w w w w w
fidelity (Wi-Fi) is the technology used to obtain an Internet connection without having to connect to a phone line or cab
le line.
1 Rationale: Wireless networking refers to the ability of a computer or device to transport signals through the air and without cords.
b h .com b h.com bh.co
m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww