World of Business Chapter 21 – Flashcards
31 test answers
Unlock all answers in this set
Unlock answers 31question
110. __________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.A. Information processing B. Data processing C. Artificial intelligence D. Business intelligence
answer
D
Unlock the answer
question
113. NASDAQ is an example of how information technology can:A. help engineers design products that exactly meet the needs of a specific target market. B. be used to create organizations and provide services that are independent of location. C. provide small firms with new opportunities to grow by forming alliances with larger companies. D. help the government measure the environmental impact of business activities.
answer
B NASDAQ is an electronic stock exchange that enables people to make trades over the computer. These exchanges have no physical location.
Unlock the answer
question
122. Transaction data gathered at the point of sale is known as:A. physical-world observations. B. business process information. C. public data. D. personal preference data.
answer
B
Unlock the answer
question
123. Data from RFID devices, miniature cameras, and wireless access used to understand where people or items are located is called:A. physical-world observations. B. biological data. C. public data. D. business process information.
answer
A
Unlock the answer
question
126. Two of the characteristics of useful information are:A. relevance and timeliness. B. redundancy and simplicity. C. clarity and confidentiality. D. flexibility and durability.
answer
A
Unlock the answer
question
127. High-quality information is:A. accurate and reliable. B. normative and open ended. C. simple and easy to use. D. subjective and unique.
answer
A
Unlock the answer
question
137. A(n) ________ is a companywide network that is based on Internet-like technology, but is closed to public access.A. enternet B. alter-net C. intranet D. inner-net
answer
C
Unlock the answer
question
138. A company can use a(n) __________ to prevent unauthorized outsiders from accessing information on its intranet.A. firewall B. disconnector C. entry sentry D. tripwire
answer
A
Unlock the answer
question
140. Many businesses choose to open their intranets to other selected organizations through the use of:A. crossnets. B. alternets. C. outernets. D. extranets.
answer
D
Unlock the answer
question
143. A(n) ___________ serves as an entry point to a variety of resources on an organization's information network.A. personal information manager B. e-transfer page C. enterprise portal D. subscription web page
answer
C
Unlock the answer
question
147. ___________ technology uses cable modems, digital subscriber lines, fixed wireless, and satellites to provide users with significantly faster Internet connections than are provided by traditional 56k modems.A. Widebeam B. Least resistance C. Analog D. Broadband
answer
D
Unlock the answer
question
148. A key element of Internet2 is:A. the requirement that all users log on to each site with a unique password. B. the very-high-speed Backbone Network Service (vBNS). C. a new security system that eliminates the risk that unauthorized users will be able to access private information. D. the high-speed Resource Allocation Prioritizer (hsRAP).
answer
B
Unlock the answer
question
158. A firm would consider establishing a virtual private network if it wanted to:A. prevent people who are not employees from being able to access its network. B. set up a secure network connection with another firm for a short period of time. C. obtain a broadband connection to the Internet. D. simulate a network before it became operational in order to identify any security leaks.
answer
B A virtual private network allows firms to establish a secure connection with other firms over regular Internet lines. This is a simpler, less expensive way to set up a secure connection than using dedicated lines.
Unlock the answer
question
160. A firm would be most likely to establish an enterprise portal if it wanted to:A. prevent outsiders from using its information network. B. allow users to access different areas of its network depending on their relationship to the firm. C. prevent viruses from being downloaded from the company's website. D. search for hidden patterns and unknown relationships among data stored in different information systems.
answer
B An enterprise portal is an entry point into a variety of resources available on an organization's network. However, these portals are more than simply web pages with links. They identify users when they log on and allow them access to different types of resources depending on their relationship to the firm. Thus customers might be given access to one set of resources while suppliers were allowed to use other resources.
Unlock the answer
question
162. Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view of her selection and additional information that will help her make a decision. When she adds the jeans to her cart, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Janelle and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called ________.A. social media B. cookie mining C. Web 2.0 D. Web 3.0
answer
D Web 3.0 is called the personal web. It advances Web 1.0, known as the static Web, and Web 2.0, known as the social web.
Unlock the answer
question
164. __________ is a process that allows software-based networked computers to run multiple operating systems and programs, and share storage.A. Public domain softwaring B. Groupwaring C. Virtual networking D. Cloud computing
answer
C
Unlock the answer
question
165. ________ is a form of virtualization in which a company's data and applications are stored offsite.A. Data warehousing B. Data mining C. Cloud computing D. Mobile softwaring
answer
C
Unlock the answer
question
166. The three types of cloud computing are:A. public, private, and personal clouds. B. application, analytic, and informative clouds. C. power, private, and virtual clouds. D. public, private and hybrid clouds.
answer
D The three types of cloud computing are private, public, and hybrid clouds.
Unlock the answer
question
167. Rob has been using Dropbox. The cloud he is storing his information to is called a:A. private cloud. B. public cloud. C. hybrid clould. D. analytical cloud.
answer
B Dropbox and other similar clouds are public clouds.
Unlock the answer
question
169. Employees of a business ____________ when they work at home, using computers linked to their organization's office.A. mainstream B. teleproduce C. telecommute D. compucommute
answer
C
Unlock the answer
question
170. A(n) _______ is someone who breaks into a computer system for illegal purposes.A. network crasher B. drive jockey C. arbitrageur D. hacker
answer
D
Unlock the answer
question
171. A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-undesirable event for the victim.A. virus B. factoid C. wasp D. firecracker
answer
A
Unlock the answer
question
172. When it comes to computers and information technology, government and corporate security officials are now most worried about:A. credit card fraud. B. online theft. C. cyberterrorism. D. counterfeiting.
answer
C
Unlock the answer
question
173. The _____________ was created as a part of the Office of Homeland Security and given the responsibility to devise a plan for improving the security of America's critical infrastructure.A. Homeland Security Board B. Critical Infrastructure Protection Board C. Electronic Communications Security Commission D. Committee on Infrastructure Security Procedures
answer
B
Unlock the answer
question
174. A _________ is a small piece of software code a website downloads onto the hard drives of people who visit the site.A. cookie B. brownie C. data marker D. file portal
answer
A
Unlock the answer
question
175. Instability in technology:A. used to be a major problem, but such problems now are largely a thing of the past. B. still exists, but could be easily eliminated if firms would upgrade to newer equipment and software. C. remains a serious problem that is caused by a variety of factors. D. still exists, but its impact on business is greatly exaggerated by the media.
answer
C
Unlock the answer
question
183. When Cy first came to work for Qwikbilt, the application of business technology was called:A. data processing. B. knowledge technology. C. information systems. D. backroom computing.
answer
A During the 1970s, the use of business technology was known as data processing, and its major purpose was to support business by improving the flow of financial information.
Unlock the answer