Filters
Question type

Study Flashcards

In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic.Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited.At issue was which data security issue?


A) unauthorized access
B) chat rooms
C) sexual innuendoes expressed through lewd humor
D) biometrics
E) consumer privacy

F) B) and D)
G) B) and E)

Correct Answer

verifed

verified

The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest range of convicted criminals permitted under current law.This will result in the collection of as many as 40,000 DNA profiles.The additional DNA profiles may be obtained as a condition of release on parole or probation, as a condition of participation in the Department of Correctional Services' temporary release programs, and as a condition of a plea bargain.This _____ will be used for solving crimes.


A) criminal relational network
B) database
C) spreadsheet
D) information processing network
E) transactional network

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

Archeologists at Shiloh, Tennessee, are exploring a mound built over 1,000 years ago.They have catalogues thousands of fragments of wood, pottery, and bone, which they want to analyze and compare to locate patterns of use.Since they cannot afford to purchase computers capable of making such sophisticated comparisons, what would you recommend they use?

Correct Answer

verifed

verified

Grid computing would allow the...

View Answer

Intranets are essentially mini-Internets that operate behind a(n) _____ that prevents unauthorized access.


A) network barrier
B) communications buffer
C) insulated connector
D) modem synthesizer
E) firewall

F) None of the above
G) D) and E)

Correct Answer

verifed

verified

_____ refers to all of the equipment and techniques needed to manage and process information.


A) A data processing system
B) A transaction system
C) Information technology
D) A relational network
E) An intranet

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

A computer program that copies itself into other software and can spread to other computer systems is called:


A) computer guerrilla activity
B) a computer vindication
C) a software infestation
D) a computer virus
E) a computer breach

F) B) and C)
G) C) and D)

Correct Answer

verifed

verified

An accounts clerk who is able to record a payment of 50 dollars into the company's main computer system as the payment is made is using an online processing system.

A) True
B) False

Correct Answer

verifed

verified

Intranets, VPNS, and extranets are forms of LANs.

A) True
B) False

Correct Answer

verifed

verified

_____ focuses on gathering and sharing an organization's knowledge to improve productivity and foster innovation.

Correct Answer

verifed

verified

Knowledge ...

View Answer

Australia's Health Insurance Commission processes 300 million health claims and makes annual payments of $8 billion of payments to clients.The company would store all of its more than three gigabytes of information in a(n) _____ to support management decision making.


A) data mine
B) information center
C) data station
D) data warehouse
E) information network

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

What is the function of digital forensics?

Correct Answer

verifed

verified

to safeguard electronic eviden...

View Answer

Processing data as they become available is called _____ processing.


A) off-line
B) online
C) auxiliary
D) batch
E) coordinated

F) D) and E)
G) B) and D)

Correct Answer

verifed

verified

A(n) _____ is a management support system that is customized for an individual executive.It provides specific information for strategic decision making.


A) decision support system
B) expert system
C) information automated system
D) executive information system
E) management database system

F) D) and E)
G) All of the above

Correct Answer

verifed

verified

Which type of information systems is used by both operational managers and middle managers?


A) information reporting system
B) transaction processing system
C) management analytic system
D) decision support system
E) expert system

F) A) and B)
G) B) and C)

Correct Answer

verifed

verified

Which type of information system is used only by operational managers?


A) management analytic system
B) transaction processing system
C) word processing system
D) executive information system
E) office automation system

F) C) and D)
G) All of the above

Correct Answer

verifed

verified

An expert system:


A) uses artificial intelligence
B) provides managers with advice similar to what they would get from a human consultant
C) is expensive and difficult to create
D) is a type of management support system
E) is accurately described by all of the above

F) B) and D)
G) B) and C)

Correct Answer

verifed

verified

A ____ is any information technology that combines many databases across an entire company into one central database that supports management decision making.

Correct Answer

verifed

verified

What does the statement, "Today most of us are knowledge workers," mean?

Correct Answer

verifed

verified

Knowledge workers develop or use knowled...

View Answer

Collecting data over a period of time and then processing that data all at the same time is called _____ processing.


A) off-line
B) on-line
C) auxiliary
D) batch
E) group

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

Grid computing is another term used for telecommuting. .

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 127

Related Exams

Show Answer