World of Business Chapter 21 – Flashcards

Unlock all answers in this set

Unlock answers
question
104. In the 1970s, business technology was known as:A. data processing. B. information processing. C. information technology. D. systems analysis.
answer
A
question
106. The primary role of business technology during the 1970s was to:A. empower workers by giving them access to ever-greater amounts of information. B. implement new production methods that relied on automated equipment. C. protect proprietary company information from outsiders. D. support existing business by improving the flow of financial information.
answer
D
question
107. During the 1980s business technology became known as:A. data processing. B. knowledge management. C. information systems. D. personal computing.
answer
C
question
109. ____________ is information charged with enough intelligence to make it relevant and useful.A. Knowledge B. Data C. An hypothesis D. A theory
answer
A
question
110. __________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.A. Information processing B. Data processing C. Artificial intelligence D. Business intelligence
answer
D
question
113. NASDAQ is an example of how information technology can:A. help engineers design products that exactly meet the needs of a specific target market. B. be used to create organizations and provide services that are independent of location. C. provide small firms with new opportunities to grow by forming alliances with larger companies. D. help the government measure the environmental impact of business activities.
answer
B NASDAQ is an electronic stock exchange that enables people to make trades over the computer. These exchanges have no physical location.
question
122. Transaction data gathered at the point of sale is known as:A. physical-world observations. B. business process information. C. public data. D. personal preference data.
answer
B
question
123. Data from RFID devices, miniature cameras, and wireless access used to understand where people or items are located is called:A. physical-world observations. B. biological data. C. public data. D. business process information.
answer
A
question
126. Two of the characteristics of useful information are:A. relevance and timeliness. B. redundancy and simplicity. C. clarity and confidentiality. D. flexibility and durability.
answer
A
question
127. High-quality information is:A. accurate and reliable. B. normative and open ended. C. simple and easy to use. D. subjective and unique.
answer
A
question
137. A(n) ________ is a companywide network that is based on Internet-like technology, but is closed to public access.A. enternet B. alter-net C. intranet D. inner-net
answer
C
question
138. A company can use a(n) __________ to prevent unauthorized outsiders from accessing information on its intranet.A. firewall B. disconnector C. entry sentry D. tripwire
answer
A
question
140. Many businesses choose to open their intranets to other selected organizations through the use of:A. crossnets. B. alternets. C. outernets. D. extranets.
answer
D
question
143. A(n) ___________ serves as an entry point to a variety of resources on an organization's information network.A. personal information manager B. e-transfer page C. enterprise portal D. subscription web page
answer
C
question
147. ___________ technology uses cable modems, digital subscriber lines, fixed wireless, and satellites to provide users with significantly faster Internet connections than are provided by traditional 56k modems.A. Widebeam B. Least resistance C. Analog D. Broadband
answer
D
question
148. A key element of Internet2 is:A. the requirement that all users log on to each site with a unique password. B. the very-high-speed Backbone Network Service (vBNS). C. a new security system that eliminates the risk that unauthorized users will be able to access private information. D. the high-speed Resource Allocation Prioritizer (hsRAP).
answer
B
question
158. A firm would consider establishing a virtual private network if it wanted to:A. prevent people who are not employees from being able to access its network. B. set up a secure network connection with another firm for a short period of time. C. obtain a broadband connection to the Internet. D. simulate a network before it became operational in order to identify any security leaks.
answer
B A virtual private network allows firms to establish a secure connection with other firms over regular Internet lines. This is a simpler, less expensive way to set up a secure connection than using dedicated lines.
question
160. A firm would be most likely to establish an enterprise portal if it wanted to:A. prevent outsiders from using its information network. B. allow users to access different areas of its network depending on their relationship to the firm. C. prevent viruses from being downloaded from the company's website. D. search for hidden patterns and unknown relationships among data stored in different information systems.
answer
B An enterprise portal is an entry point into a variety of resources available on an organization's network. However, these portals are more than simply web pages with links. They identify users when they log on and allow them access to different types of resources depending on their relationship to the firm. Thus customers might be given access to one set of resources while suppliers were allowed to use other resources.
question
162. Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view of her selection and additional information that will help her make a decision. When she adds the jeans to her cart, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Janelle and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called ________.A. social media B. cookie mining C. Web 2.0 D. Web 3.0
answer
D Web 3.0 is called the personal web. It advances Web 1.0, known as the static Web, and Web 2.0, known as the social web.
question
164. __________ is a process that allows software-based networked computers to run multiple operating systems and programs, and share storage.A. Public domain softwaring B. Groupwaring C. Virtual networking D. Cloud computing
answer
C
question
165. ________ is a form of virtualization in which a company's data and applications are stored offsite.A. Data warehousing B. Data mining C. Cloud computing D. Mobile softwaring
answer
C
question
166. The three types of cloud computing are:A. public, private, and personal clouds. B. application, analytic, and informative clouds. C. power, private, and virtual clouds. D. public, private and hybrid clouds.
answer
D The three types of cloud computing are private, public, and hybrid clouds.
question
167. Rob has been using Dropbox. The cloud he is storing his information to is called a:A. private cloud. B. public cloud. C. hybrid clould. D. analytical cloud.
answer
B Dropbox and other similar clouds are public clouds.
question
169. Employees of a business ____________ when they work at home, using computers linked to their organization's office.A. mainstream B. teleproduce C. telecommute D. compucommute
answer
C
question
170. A(n) _______ is someone who breaks into a computer system for illegal purposes.A. network crasher B. drive jockey C. arbitrageur D. hacker
answer
D
question
171. A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-undesirable event for the victim.A. virus B. factoid C. wasp D. firecracker
answer
A
question
172. When it comes to computers and information technology, government and corporate security officials are now most worried about:A. credit card fraud. B. online theft. C. cyberterrorism. D. counterfeiting.
answer
C
question
173. The _____________ was created as a part of the Office of Homeland Security and given the responsibility to devise a plan for improving the security of America's critical infrastructure.A. Homeland Security Board B. Critical Infrastructure Protection Board C. Electronic Communications Security Commission D. Committee on Infrastructure Security Procedures
answer
B
question
174. A _________ is a small piece of software code a website downloads onto the hard drives of people who visit the site.A. cookie B. brownie C. data marker D. file portal
answer
A
question
175. Instability in technology:A. used to be a major problem, but such problems now are largely a thing of the past. B. still exists, but could be easily eliminated if firms would upgrade to newer equipment and software. C. remains a serious problem that is caused by a variety of factors. D. still exists, but its impact on business is greatly exaggerated by the media.
answer
C
question
183. When Cy first came to work for Qwikbilt, the application of business technology was called:A. data processing. B. knowledge technology. C. information systems. D. backroom computing.
answer
A During the 1970s, the use of business technology was known as data processing, and its major purpose was to support business by improving the flow of financial information.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New