Vous êtes sur la page 1sur 40

ob -b ob -b ob -b -b -b

w.u w.u w.u .uob w.u


ob
ww ww ww www w w

h.c om h.c om h.co


m
h.c om .c om
b-b b-b - b b-b -bh
w .uch11
o
w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww

Student: ___________________________________________________________________________
m m m m
h.co h.co h.co h.co h.c om
b - b b- b b - b -b b-b
o uo and figures that can uoused for managerial decision ob o
w w.u1. Data are the processed
w w.facts w w.be w.u making. w.u
w True False w w ww w w

h.c om h.com h.c om h.c om h.co


m
o b-b .uob
- b b-b
.uo as information systems.
o b-b .uo b- b
w w.u2. In the early 2000s business
w w technology because
w wknown w w.u w
w True False
w w w ww

b h .com b h.com bh.co


m
h.c om h.c om
o b- .uo b- b-
.uo processing. Its primary o b-b uo flow b-b
w w.u3. In the 1970s business
w wtechnology was knownw wdata
as w w.upurpose was to improve
w w.the
w w w w w
of financial information.
True False
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
4. Data is raw, unanalyzed and unorganized facts and figures.
True False
.c om .com h.c om .com h.c om
ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww
5. IT creates organizations and services that are independent of location.
True False
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww
6. Virtualization is accessibility through technology that allows business to be conducted anywhere at any time.
True Falsem m m m
h.c o h.co h.c o h.c o .c om
b-b b - b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
7. Instant messaging is not used in business; it is a personal communication tool.
True Falsem m m
h.co h.c o h.c o om om
- b b-b b-b bh.c b-b
h.c
.uo b .uo .uo ob- .uo
w w w w.u w
ww ww ww ww ww
8. E-business refers to any electronic business data exchange using any electronic device.
True Falseom om om om om
h.c h.c h.c h.c h.c
.uo b-b .uo b-b .uo b-b o b-b .uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
9. One disadvantage of technology is that it increases the number of corporate barriers.
.com
True False
h .com
h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
10. Technology has increased the number of consumer complaints in business.
.com
True False
h .com
h .com h h.com h.c om
.uo b-b .uo b-b o b-b ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w

11. Technology eliminates layers of management.


.com
True hFalse h.co
m
h.c om h.c om h.co
m
o b-b .uob
-b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
12. The phenomenon of reading papers and reports online is known as infoglut.
.com
True bhFalse bh.c
om
bh.c
om h.c om h.c om
.uob
-
.uob
-
.uob- .uo b-b .uo b-b
w w w ww w w
w ww w ww ww

13. A data warehouse


m contains historical
m paper-based information mprior to scanning it for electronic
m storage.
.c o
True-bhFalse bh . c o
b h .c o
b h . c o
b h .com
ob b-
.uo b-
o b-
o .uob-
w.u w w.u w.u w
ww ww ww ww ww

14. Data mining


om looks for hiddenhpatterns
.com
in the data in a data warehouse
.com
and discovers relationships
.com
among the
.com
data.-bh.c b b h b h b h
ob ob- ob- ob- ob-
w.uTrue False w.u w.u w.u w.u
ww ww ww ww ww

. com . com . com . com .c om


o -bh of information means
15.bQuality
ob -bhthe information is accurate
o b -bh and reliable. o b -bh ob -bh
.u .u .u .u .u
w ww True False ww w ww w ww w ww
w

h .com h .com h .com h.c om .c om


16. b
obThe
b
- more information provided
- the better it is. ob- b b-b -bh
w .uTrue False w .uob w.u w.u
o
w .u ob
ww ww ww w w ww

b h .com b h .com b h .com b h .com h.c om


obIt- is important for information
17.
.uTrue .
-
uob provided to be w
-
relevant
. uob to the issue at hand.
. uob
-
.uo b-b
w False w w w
ww ww ww ww ww

bh .com b h .com b h .com bh .com h.com


obA- data warehouse stores
.u18. b- on a specific subject
.uodata b- a period of time. .uob-
.uoover .uo b-b
w w w w w
ww True False ww ww ww ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
19. The proper management of information is the core of most companies' business.
.com
True False
h .com
h .com h.c om .c om
b-b b-b -bh b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
20. Information usefulness is based on six characteristics.
.com
True False
h .com
h h .com h.com h.c om
.uo b-b .uo b-b o b- b
ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w

21. In Internet retail, data mining is called shopping cart analysis.


.com
True hFalse h.co
m
h.co
m
h.c om h.co
m
o b-b .uob
-b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
22. Wireless networking refers to the technology used to obtain an Internet connection without having to
connect
b h .tocoamphone line or cablebline.
h.com bh .com b h .com b h .com
ob- False
.uTrue .uob
-
.uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww

m
o the technology used hto.cobtain
o m m m m
- b h.cis
23. Wi-Fi - b - b h.co without having to-bconnect
an Internet connection h.co to a phone line or-bh.co
ob ob ob ob ob
ww.ucable line. w w.u w w.u w w.u w w.u
w True False w w w w

b h .com bh .com b h .com b h.com b h .com


-
obAn ob- b- ob- ob-
w .u24. .uhardware
intranet consistswof .uoprevents
and softwarewthat outsiders from
w .uaccessing information w .uuser
the
ww does not want othersww to see. ww ww ww
True False
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u ww
.u
w ww ww ww w
25. An intranet is a companywide network, closed to public access that uses Internet-type technology.
True False
h.c om h .com h.c om h.com .c om
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
26. An extranet is a semiprivate network that uses Internet technology and allows more than one company to
access the same information or allows people on different servers to collaborate.
.com
True False
h .com
h .com
h .com
bh h.c om
.uo b-b .uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
27. A virtual private network is a private data network that creates secure connections or "tunnels" over regular
b com
Internet .lines.
h b h .com b h .com bh .com b h .com
ob- False
uTrue uob
-
uob
-
uob
-
uob
-
w. w. w. w. w.
ww ww ww ww ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
28. A gateway is an entry point into a Web site.
.com
True False
h h .com h.co
m
h.c om .c om
b-b b-b - b b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
29. Shareware is copyrighted but distributed to potential customers free of charge.
.com
True False
h .com
h .comh h.com h.c om
.uo b-b .uo b-b o b-b ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w

30. Public domain software is software that is free for the taking.
.com
True hFalse h.co
m
h.co
m
h.c om h.co
m
o b-b .uob
-b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
31. IBM is working on a solution to computer breakdowns called SMASH.
.com
True bhFalse bh.c
om
bh.c
om h.c om h.c om
.uob
-
.uob
-
.u ob- .uo b-b .uo b-b
w w w ww w w
w ww w ww ww

32. Wirelessmnetworking has set the common


m PC free from cords.
.c o
True-bhFalse bh . c o
b h .com h.c om h.c om
ob -
.uob
- ob o b-b .uo b-b
w.u w w.u w.u w
ww ww ww ww ww

33. The Wi-Fi available in Panera Bread allows users with wireless laptops to connect to the Web.
.com
True-bhFalse bh .com b h .com b h.com h.c om
.uob .uob
- -
.uob
-
.uob .uo b-b
w w w w w
ww ww ww ww ww

34. A VPNoallows a company to have privacy and security in its network.


h .c m h .com h .com h.com .c om
o
True
b- b False b- b
o b- b b-b b -bh
w.u w.u w .uo w.u
o
w .u o
w w ww ww ww ww

35. It is important to find the right software


h .com h .com before findingbthe
h
right
.co m hardware.
h .com .com
b
True- False - b - - b -bh
w .uob w .uob .uob
w .uobw w .u ob
ww ww ww ww ww

b .com provider mightbuse


36. A healthcare
h h .coanmexpert system to diagnose
b h .coma skin problem experienced
b h .com by someone in bh.com
her - 20s.
obearly - - - -
w .uTrue w . uob w . uob w . uob w . uob
ww False ww ww ww ww

bh .com b h .com b h .com bh .com b h .com


obA- phish is a piece of programming
.u37. .uob
- ob- other programming .touocause
code inserted.uinto b- some unexpected.uand -
obfor
w w w w w
ww the victim, usually undesirable,
ww event. ww ww ww
True False
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
38. An encryption is a secret code given to information when it is passing through the Internet.
.com
True False
h .com
h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
39. Cookies are pieces of information sent by a Web site over the Internet to your Web browser.
.com
True False
h .com
h .comh .com
bh h.c om
.uo b-b .uo b-b o b-b ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w

40. Instability in technology may be caused by human error.


.com
True hFalse h.co
m
h.co
m
h.c om h.co
m
o b-b .uob
-b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
41. Computer viruses can often cause instability in technology.
.com
True bhFalse bh.c
om
bh.c
om h.c om h.c om
.uob
-
.uob
-
.u ob- .uo b-b .uo b-b
w w w ww w w
w ww w ww ww

42. All the information


m found online ismreliable.
.c
True-bhFalseo .co h.c om h.c om h.c om
ob -bh b-b b-b b-b
w.u w .uob w.u
o
w.u
o
w .uo
ww ww ww ww ww

43. Computers today are still susceptible to hackers.


.com
True-bhFalse bh .com h.c om h.com h.c om
.uob .uob
-
.uo b-b .uo b- b
.uo b-b
w w w w w
ww ww ww ww ww

44. To protect from viruses computerom users should practice "safe computing".
h .com h .c h .com h.c om .c om
True
ob- b False
ob- b b- b b-b b -bh
w.u w.u w .uo w.u
o
w .u o
w w ww ww ww ww

45. E-mail
h .coismprivate and secure.bh.com h.c om h.c om .c om
True b
ob- False ob- b-b b-b b -bh
w .u w .u w .uo w.u
o
w .u o
ww ww ww w w ww

b com for business technology


46. The .name
h b h .com b h .com Its primary purpose
in the 1970s was __________.
b h
m to improve the .com
.cowas bh
.u ob-of financial information.
flow
. u ob- . u ob- . u ob- . u ob-
w w w w w
ww ________________________________________
ww ww ww ww

bh .com b h .com b h .com bh .com h.com


.u47.
-
obRaw, uob
-
unanalyzed and.unorganized -
.uobare called __________.
facts and figures .uob
-
.uo b-b
w w w w w
ww ________________________________________
ww ww ww ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - ob- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
48. __________ is the processed and organized data that can be used for managerial decision making.
.com .com
________________________________________
h h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
49. __________ is the name for the business technology of the 1980s. Its role changed from supporting the
business.c m business. Technology
toodoing .comsuch as ATMs and .commail are examples.bh.com
voice .com
bh b h b h b h
ob- -
u________________________________________
uob uob
-
uob
-
uob
-
w. w. w. w. w.
ww ww ww ww ww

50. In the
h om the name given to
.c1990s h om technology wash.__________.
.cbusiness com .com
Its role because
h the way of doing h.com
b b b b b
.u ob-
business, ob-technology to help with
rather than just .using
u . u
-
obbusiness functions. .uob- . uob-
w w w w w
ww ________________________________________
ww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
o b- b-
o through technology.uthat b-
o allows business to be.uconducted
o b-b o b-b
w w.u51. __________ is accessibility
w w.u w w w w anywhere at any
w w.u time.
w ________________________________________
w w w w

b h .com bh .com b h .com b h .com h.c om


.u52.
-
ob__________ .uob
-
allowswbusinesses to communicate b- time, for free, via computer.
inoreal
.u .uob
-
.uo b-b
w w w w
ww ________________________________________
ww ww ww ww

b h .com bh .com b h .com b h.com h.c om


-
ob__________
.u53.
- -
.uob business data exchange
.uob using any electronic ob-
.udevice. .uo b-b
w is any w
electronic w w w
ww ________________________________________
ww ww ww ww

h .com h .com h .com h .com .c om


- b
obSelling - b - b - b -bh
w.u54. products or .uob online through e-business
services
w w .uob is called __________.
w .uob w .u ob
ww ________________________________________
ww ww ww ww

h.com h .com h.c om h.c om .c om


o b-b o b- b b-b b-b b -bh
w.u55. Any business participating .uo
w.u in e-__________wiswengaging w.u
in e-__________.
o
w .u o
w w w w w w w ww
________________________________________

m om om om om
bh.co h.c h.c bh.c h.c
o b -
.uo b-b o b-b ob- .uo b-b
w w.u56. The phenomenonwofwinformation overload in
w w.u
business w.u
is called __________. w
w w w ww ww
________________________________________

bh .com h.c om h .com h.co


m
h.com
o b- o b-b o b- b
o b - b
.uo b-b
w w.u57. A(n) __________wstores
w.u data on a specific subject
w w.u over a period of time.
w w.u w
w w w w ww
________________________________________
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
58. __________ is looking for hidden patterns in the data in a data warehouse and discovering relationships
among the m
.codata. .com .com .com .com
b h b h b h b h b h
ob- ob-
________________________________________ ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww

b h .com retail, data mining


59. In Internet
b h om __________. h.com
is.ccalled
h.com h.c om
ob- - -b ob-
b b-b
w .u________________________________________
w uob
. uob
w. w.u w.u
o
ww ww ww ww w w

b .com information, usefulness


60. To hmanage
b h.comis based on these four
b h om
.ccharacteristics: b h .comcompleteness, bh.com
__________,
ob-
.utimeliness and relevance..uob- .uob
-
.uob
-
.uob
-
w w w w w
ww ________________________________________
ww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
o b- b-
uo ability of a computerwor b-
.uodevice to transport signalso b-b o b-b
w w.u61. __________ refersww
to.the
w w w.u through the air. ww.u
w ________________________________________
w w w w

b h .com b h .com b h .com b h .com b h .com


-
obThe b- an Internet connection- - -
w .u62. technology used
w .touoobtain w .uob without having towconnect
.uob to a phone line orwcable
.uobline
ww is called __________. ww ww ww ww
________________________________________

.c om .com h.c om .com h.c om


ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww
63. A(n) __________ is a companywide network, closed to public access that uses Internet-type technology.
________________________________________
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u ww
.u
w ww ww ww w
64. A(n) __________ can consist of hardware or software and prevents outsiders from accessing information
the user does not want others to see.
________________________________________
com com com com om
h. h. h. h. .c
b-b b-b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
65. A(n) __________ is a semiprivate network that uses Internet technology and allows more than one company
omsame information orhallows
to access.cthe
h .com people on differenth com to collaborate. bh.com
.servers h .com
b b b b
ob- ob-
________________________________________ ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww

bh .com are people whobh


66. __________ .cominto computer systems
break
b h omillegal purposes. h.com
.cfor h.c om
ob- - - -b b-b
w . u________________________________________
wuob. uob
w . uobw. w .uo
ww ww ww ww ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
67. A(n) __________ is a private data network that creates secure connections or "tunnels", over regular

b com
Internet .lines.
h b h .com bh .com b h .com b h .com
- -
________________________________________ - - -
w .uob .uob
w .uob
w .uobw .uob w
ww ww ww ww ww

bh .comthat is copyrightedbbut
68. Software
h
m
.codistributed .com free of chargebhis.ccalled
to potential customers
b h om __________. h.com
ob- - - - -b
w. u________________________________________
uob
w. uob
w. uob w. uob w.
ww ww ww ww ww

69. IBM m
.cisoworking .co
on a solutionhto m
__________ .com called SMASH: bsimple,
with an approach .commany and .com
b h b b h h bh
ob-
.uself-healing. .uob
-
.uob
-
.uob
-
.uob
-
w w w w w
ww ________________________________________
ww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
o b- b-
.uo you to connect your o b- b-b
o an airport or Panera.uBread
o b-b
w w.u70. The technology that
w wallows w w.ulaptop to the Internet w
in a.hotel,
wu w w
w is called __________.
w w w w
________________________________________

.c om h.co
m
h.c om h.com h.c om
ob -bh o b- b
o b-b o b-b
o b-b
w .u w.u w.u w.u w.u
w w w w
w is a piece of programming
71. A(n) __________ w w
w code inserted into otherwprogramming to cause some
w
unexpected and for the victim, usually undesirable, event.
________________________________________
m m
.c o h.co h.com .com h.c om
ob -bh ob - b b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww
72. Most e-mail travels over the Internet in __________ plain text, meaning that the information can be viewed
by anyone.om
h .c h .com
________________________________________
b b b h .com b h .com b h .com
o b- b- o b- .uo b- o b- o
w w.u w.u w w.u w.u
w ww ww ww ww

73. Web c sites


omoften send __________ to your computer that stay
com comon your hard drive.bh.com om
h . h . h . .c
b- b b- b
________________________________________ b- b b- b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww

74. When
h om
.cevaluating .com consider __________.
data on the Internet,
h h .comHow reliable and free
h com error is the
.from h .com
b b b b b
ob-
information?
.uob
-
.u________________________________________ .uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww

bh .com b h .com b h .com bh .com b h .com


- - - - -
w .u75.
obWhen evaluating data uon
w . obthe Internet, considerw__________.
.uob Is the information
w .uob presented with a minimum
w .uob
ww of bias? ww ww ww ww
________________________________________
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
76. If 30 terrorists with __________ skills and $10 million attacked the U.S. today, they could shut down entire

b h .com money supply,bhelectricity


communications, .com and transportation bh om
.csystems. b h .com b h .com
ob- ob-
________________________________________ ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww

h om __________ of U.S.
77. More.cthan
h om
.ccompanies scan employee
h om regularly and legally.
.ce-mail h.com h.c om
b b b b b-b
ob- -
u________________________________________
uob uob
-
uob
- o
w . w . w. w. w.u
ww ww ww ww w w

78. In the
h om business technology
.c1970s h
m known as _________________.
.cowas h .com h .com h.co
m
- b - b - b - b - b
w.uA.obData processing w.uob w .uob w .uob w .uo b
ww B. Information systems
ww ww ww ww
C. Data analysis
D. Information technology
b h .com b h.com bh.co
m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
79. __________ is/are raw, unanalyzed and unorganized facts and figures.
A. Information
b h .com
B. Spreadsheets bh .com b h .com b h .com h.c om
-
.uC.obData .uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww D. Numeracy ww ww ww ww

b h .com bh .com b h .com b h.com b h .com


-
ob__________ ob- - - -
w .u80. w .uprocessed
is/are the and organized
w uob that can be used forwmanagerial
.data .uob .uob
decision making.
w
ww A. Data ww ww ww ww
B. Information
C. Knowledge
h .com .c om h.c om h.com .c om
o
D. bIntelligence
- b
ob -bh b-b b-b b -bh
w.u w .u w .uo w.u
o
w .u o
w w ww ww ww ww

81. In the 1980s


h . com business technology
h . cowas
m known as _____________________.
h . com h . com .c om
A. Data
- processing
b - b - b - b -bh
w .uB.obInformation systemsw.uob w .uob w .uob w .u ob
ww C. Data analysis ww ww ww ww
D. Information technology
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
82. In the 1990s business technology then became known as _________________.
A. Data processing

b h .com systems
B. Information
b h .com b h .com bh .com h.com
- analysis
C. Data
.uD.obInformation technology
.uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww ww ww ww ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
83. Blackberries or wireless laptop computers encourage __________ or independence of location.

b .com
A. Virtualization
h b h .com bh .com b h .com b h .com
-
B. Instant messaging - - - -
w .uC.obWi-Fi w.uob w .uob w .uob w .uob
ww ww ww ww ww
D. Viral marketing

m .com .com .com om


bh.co b h b h b h h.c
o b - ob- o b- ob- o b-b
w w.u84. The advantage to w
IMw.inu business is that ___________________.
w w.u w.u w.u
w w w ww w w
A. It is immediate
B. There is no incremental cost
C. Business
b h .com .com in multiple conversations
professionals can participate
b h b h .com at once h.c om h.co
m
- - to IM
.uD.obAll of the above are advantages
.uob .uob
- o b-b .uo b- b
w w w w.u w
ww ww ww ww ww

b h .com overload in business


85. Information
b h.coismalso called ____________________.
bh .com b h .com h.c om
-
.uA.obInfoglut .uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww B. Infoquan ww ww ww ww
C. Infosum
D. Overinfo
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
86. A(n) __________ stores data on a specific subject over a period of time.
A. Data handler
B. Infob h .com
handler bh .com b h .com b h.com h.c om
-
.uC.obInfo warehouse .uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww D. Data warehouseww ww ww ww

bh .com b h .com b h .com b h .com b h .com


-
ob__________ ob- patterns in the data - ob- -
w.u87. w .uhidden
looks for w .uoinba data warehouse and
w .udiscovers relationships w .uob the
among
ww data. ww ww ww ww
A. Data deciphering
B. Data patterning
h com
.mining h .com h.c om h.com .c om
C. b
Data
- b - b b-b b-b -bh
w .uD.o Data development w.uob w .uo w.u
o
w .u ob
ww w
w ww w w ww

bh . com b h .com b h . com b h . com h.c om


88. In
- Internet __________,odata
.uA.obManufacturing .u b
- mining is called shopping
.uob
- cart analysis.
.uob
-
.uo b-b
w w w w w
ww B. Wholesaling
ww ww ww ww
C. Retailing
.com
D. Cooperatives
h h.com h .com h.co
m
h.com
.uo b-b .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
89. Usefulness is based on four characteristics: quality, completeness, timeliness and
.com
______________________.
h h .com h .com h .com .c om
- b
A. Accuracy - b - b - b -bh
w .uB.obLots of information w.uob w .uob w .uob w .u ob
ww ww ww ww ww
C. Quick retrieval
D. Relevance
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
90. Hardware includes ______________________.
A. Computers
B. Pagers
b h .com b h.com b h .com h.c om h.co
m
-
.uC.obIPods .uob
-
.uob
- o b-b .uo b- b
w w w w.u w
ww D. All of the aboveww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
91. b-
o __________ refers to.the b-
o ability of a computer or b-
odevice to transport signals b-b
othrough the air. o b-b
w w.uA. Wireless networking
wwu w w.u w w.u w w.u
w w w w w
B. Wireless fidelity
C. Wireless signaling
om h.co
m om om om
bh.c wiring
D. Flexible b b-b
h.c
b-b
h.c
b-b
h.c
ob- .uo b- o o .uo
w.u w w.u w.u w
ww ww ww ww ww

92. The technology


m used to obtain an Internet
m connection withoutmhaving to connect to a phone
m line or cable line .com
is called . c o . c o . c o . c o
-bh _____________________.
obWireless ob-
bh
ob-
bh
ob-
bh
ob-
bh
w .uA. networking
w . u w . u w .u w . u
ww B. High-fidelity ww ww ww ww
C. Wireless fidelity
D. Free networking
m m m m m
bh .co .co .co .co .c o
ob- -bh ob-
bh
ob-
bh -bh
. u .uob w.u w.u .u ob
w ww ww
w
ww ww ww
w
93. A(n) __________ is a companywide network closed to public access that uses Internet-type technology.
A. Extranetom
B. b h .c
Intranet
b b h .com b h .com b h .com b h .com
- - - - -
w .uC.o Companet w .uob w .uob w .uob w .uob
ww D. Firewall ww ww ww ww

m om om om om
bh.co h.c h.c bh.c h.c
o b - o b-b o b-b ob- .uo to b-b
w w.u94. A(n) __________wprevents
w.u outsiders from accessing
w w.u corporate information
ww.uthe user does not want
w wothers
w see.
w w w w
A. Intranet

bh .com
B. Firewall
h.c om h .com h.co
m
h.com
-
C. Extranet
.uD.obCastlewall .uo b-b .uo b- b
o b - b
.uo b-b
w w w w w.u w
w ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
95. Just as phone companies provide secure shared resources for voice messages, __________ provide the same

b .com of public resources


secure sharing
h b h com
.for data.
bh .com b h .com b h .com
-
A. VIPs - - - -
w .uB.obVPNs w .uob w .uob w .uob w .uob
ww ww ww ww ww
C. EXNs
D. IMPs
m .com .com .com om
bh.co b h b h b h h.c
.uob -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
96. Which of the following statements about computer software is true?
A. An expert system is a type of software that only expert users are qualified to use
b h .comis not copyrightedband
B. Shareware h.coismfree for the taking bh.com b h .com bh.co
m
- ob-allows people to work b- ob- -
w.uC.obGroupware is softwarew .uthat w .uocollaboratively and share
w .uideas w .uo b
ww D. All of the abovewstatements
w are true ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
97. b-
o Which of the following b-
ois an information technology b-
o challenge? .uo b-b .uo b-b
w w.uA. Governmental security
w w.u w w.u w w
w w w ww ww
B. Security
C. Stability
omabove are IT challenges
of.cthe om om om om
D. Allbh bh.c b-b
h.c
b-b
h.c
b-b
h.c
ob- ob- o o .uo
w.u ww
.u w.u w.u w
ww w ww ww ww

98. Programming m codes inserted into other


m programming to cause munexpected events are called
m
. c o
________________________.
h h . c o h . c o h. c o h.c om
- b - b - b - b b-b
w .uA.obViruses w .uob w .uob w .uob w .uo
ww B. Beetles ww ww ww ww
C. Phishes
D. Gorillas m m m m
h.co .co h.c o h.co .c om
- b -bh b-b b-b -bh
.uob .u ob .uo w.u
o .u ob
w ww ww
w
ww
w
ww ww
w
99. What percentage of the systems the government needs to protect is in the private sector?
A. 10
30-bh.
com h .com h .com h .com .c om
B. b - b - b - b -bh
w .uC.o 50 w .uob w .uob w .uob w .u ob
ww D. 85 ww ww ww ww

m om om om om
bh.co h.c h.c bh.c h.c
o b - b-b
.uo the Internet in __________
o b-b ob- o b-b
w w.u100. Most e-mail travels
w wover w w.u plain text, meaning
w
u the information being
w.that w w.usent is
w w w
not in a secret code and anyone can view it.
w w
A. Completely

bh .com
B. Unencrypted
b h .com b h .com bh.co
m
h.com
-
C. Uncoded
.uD.obPure .uob
-
.uo b- o b -
.uo b-b
w w w w w w.u w
w w ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
101. A(n) __________ is a piece of information sent by a Web site over the Internet to your Web browser that
the browser
b h .com b h om back to the serverhwhenever
is expected to save and.csend
b .com the user returnsb h
to om Web site.
.cthat b h .com
-
A. Danish - - - -
w .uB.obRetro w .uob w .uob w .uob w .uob
ww ww ww ww ww
C. Cookie
D. Candy
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
102. Which of the following statements about government security is correct?
A. Today most government officials are worried about hackers and credit card fraud
b h .com agencies need only
B. Government
b h om government computers
.csecure b h .comto secure the country
b h .com bh.co
m
- b- - - -
w.uC.obTechnology workersware
.uoreluctant .uob to the governmentw.uob
to give information
w w .uo b
ww D. All of the abovewstatements
w are correct ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
103.b-
o Which of the following b-
o statements about privacy b-
.uoon the Internet is correct?
.uo b-b .uo b-b
w w.uA. U.S. companies arewnot
w.uallowed by law to scan
w wemployee w w w
w w w e-mail w ww
B. Most e-mail travels over the Internet in encrypted text
C. The Internet allows Web surfers to access all sorts of information about both business and individual Web
m .com .com .com .com
sites bh.co bh b h b h b h
- - - - -
w .uD.obAll of the above statements
w .uob are correct w .uob .uob
w .uob w
ww ww ww ww ww

om om om .com om
bh.c three ways that information
104.-Explain -bh
.c
-bh
.c business.
technology is changing
b- b h
b-b
h.c
w .uob w .uob w .uob w .uo w .uo
ww ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww

b .com information, we
105. Inhmanaging
b h comto know what is useful
.have b h
m what is not useful. .Describe
.coand b h com the four b h .com
ob-
.ucharacteristics .uob
of usefulness. -
.uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww

m om om om om
bh.co h.c h.c bh.c h.c
.uob -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.c om
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
106. Explain the difference between shareware and freeware.
h.c om h.c om h.co
m
h.c om .c om
b-b b-b - b b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww

m .com .com .com om


bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
107. List the information technology challenges of today.

h.c om h.com h.c om h.c om h.co


m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww

.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww

.c om .com h.c om .com h.c om


ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww

h.c om h .com h.c om h.com .c om


b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww

m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w

h.c om h.c om h.co


m
h.com .c om
b-b b-b b b-b -bh
.uch11 Key -
w
o
w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww

b h .com b h.com b h .com b h.com b h .com


- - ob-be used for managerial b- -
w .u1.o(p.b 359) Data are the processed
w .uob facts and figures that
w .ucan w .uodecision making.
w.uob
ww FALSE ww ww ww ww

h.c om h.com h.c om h.c om h.co


m
b-b
Dias - Chapter 11 #1
o .uob
- b
.uo b-b ob-b .uo b- b
w w.u Learning Goal: Explain information technology's role in business
w w w.u w
w ww
Level of Learning: Knows basic terms and facts
ww ww ww

2. (p. 359) Incothe


m early 2000s business.ctechnology
om because known coas
minformation systems..com om
b h . b h bh . bh h.c
FALSE
.uob- ob- ob- ob- .uo b-b
w w.u w .u w .u w
ww ww ww ww ww
Dias - Chapter 11 #2
om h.co
m
Learning Goal: Explain information technology's role in business
.c h.c om h.c om h.c om
-bh b
Level of Learning: Knows basic terms and facts
ob b- b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
3. (p. 359) In the 1970s business technology was known as data processing. Its primary purpose was to improve
the flow of financial
m information.
TRUE b h . c o
bh .com b h .com b h.com b h .com
- - - - -
w .uob w .uob w .uob w .uob w .uob
ww ww ww ww ww
Dias - Chapter 11 #3
Learning Goal: Explain information technology's role in business
m
h.co
Level of Learning: Knows basic terms and facts.c om h.c om h.c om .c om
- b -bh b-b b-b -bh
.uob .u ob .uo w.u
o .u ob
w ww ww
w
ww
w
ww ww
w
4. (p. 359) Data is raw, unanalyzed and unorganized facts and figures.
TRUE
h.c om h .com h.c om h.c om .c om
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww Dias - Chapter 11 #4 ww ww w w ww
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
m om om om om
bh.co h.c h.c bh.c h.c
o b - b-b
o and services that are o b-b ob- .uo b-b
w w.u5. (p. 361) IT creates organizations
w w.u w w.u independent of location.
w.u w
w TRUE w w ww ww

bh .com b h .com b h .com bh.co


m
h.com
ob- -Chapter 11 #5
.uDias
-
.uob role in business .uob
- o b -
.uo b-b
w w
Learning Goal: Explain information technology's w w.u w
ww Level of Learning: Knows basicww terms and facts ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
6. (p. 362) Virtualization is accessibility through technology that allows business to be conducted anywhere at any
time. .com .com .com .com .com
b h b h bh b h b h
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #6
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
7. (p. 362) Instant messaging is not used in business; it is a personal communication tool.
FALSE m m m
h.c o h.co h.c o h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #7
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts

b h .com b h.com bh.co


m
h.c om h.c om
o b- o b- o uo b- o b-b b-b
w w.u8. (p. 363) E-business refers
w w.uto any electronic business
w w.udata exchange using any
w w.electronic device. w w.u
w w w w w
TRUE

b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #8
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts

com
. 11.2) One disadvantage
bhFigure . com h. bh. com . com com
9. (p.
o b -362; ob -bh of technology is that
o b -itbincreases the number of
o b -corporate barriers.
o b -bh
.u .u .u .u .u
w ww FALSE ww w ww w ww www w

m om om om om
h.co
Dias - Chapter 11 #9
b -bh
.c h.c h.c -bh
.c
.uob
- b
Learning Goal: Explain information technology's role in business
.u o .uo b-b o b-b ob
ww
Level of Learning: Understands concepts and principles
w w w.u w .u
w ww ww ww ww
Rationale: Figure 11.2 states that technology is breaking down corporate barriers, allowing functional departments or product groups (even factory workers) to share
critical information instantly.

com
h. Figure 11.2) Technology -has com
bh.increased the numberb-of .
bhconsumer com
h. com .c om
10.b(p.-b362;
o o b o
complaints bin-bbusiness.
o ob -bh
.u .u .u .u .u
w ww FALSE www ww w ww w ww
w

m om om om om
h.co
Dias - Chapter 11 #10
b h.c h.c bh.c h.c
- b-b
Learning Goal: Explain information technology's role in business
.uo b .uo .uo b-b ob- .uo b-b
w Level of Learning: Understands concepts and principles
w w w.u w
ww ww ww ww ww
Rationale: Figure 11.2 states that customer service representatives can solve customers' problems instantly by using companywide databases to complete tasks from
changing addresses to adjusting bills. Information gathered from customer service interactions can further strengthen customer relationships.

bh .com h.c om h .com h.co


m
h.c om
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
11. (p. 362; Figure 11.2) Technology eliminates layers of management.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #11
Learning Goal: Explain information technology's role in business
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: Figure 11.2 states that technology eliminates layers of management and cuts the number of employees. Companies use computers and telecommunication
b b b b h.c
.uo b -
.uo b- o
equipment to create "virtual offices" with employees in various locations. b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
12. (p. 364) The phenomenon of reading papers and reports online is known as infoglut.
FALSE .com om om om m
- bh bh.c bh.c bh.c bh.co
.uob .u ob- .uob
- ob- .uo b-
w w ww w w w.u w
w w w ww ww
Dias - Chapter 11 #12
Learning Goal: Understand how information is managed

.com .com m om om
Level of Learning: Knows basic terms and facts
b h b h bh.co h.c h.c
o b- o b- o ob- o b-b b-b
w w.u ww.u w w.u w w.u w w.u
w w
13. (p. 365) A data warehouse contains historicalwpaper-based informationw w
prior to scanning it for electronic
storage.
FALSE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
Dias - Chapter 11 #13
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts

b h .com bh .com b h .com b h.com b h .com


ob-
.u14. . uob
-
. uob
-
.uob
-
. uob
-
w w
(p. 365) Data miningwlooks for hidden patternsw w w w
ww w w in the data in a data warehouse
ww and discovers relationships
ww
among the data.
TRUE
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #14 ww ww ww ww
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts

h.c om h .com h.c om h.c om .c om


o b-b b- b
o means the information
o o b-b b-b ob -bh
w w.u15. (p. 365) Quality of information
w w.u w w.u is accurate and reliable.
w w.u w .u
w TRUE w w w ww

bh .com b h .com h.c om


bh.c
om h.c om
ob- -Chapter 11 #15
.uDias
-
.uob is managed .uo b-b ob- .uo b-b
w Learning Goal: Understand how w
information w w.u w
ww Level of Learning: Knows basicww terms and facts ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
16. (p. 365) The more information provided the better it is.
FALSE .com .com m om om
h h h.co h.c -bh
.c
.uo b-b o b-b .uob
- b
o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #16
Learning Goal: Understand how information is managed
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- ob- o b-b
w w.u w w.u w w.u w.u w.u
w w for information provided
17. (p. 365) It is important ww at hand.
w to be relevant to the issue w w
TRUE

h.c om h.com h.c om h.c om h.co


m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.uDias - Chapter 11 #17 w w w.u w
w ww
Learning Goal: Understand how information is managed ww ww ww
Level of Learning: Knows basic terms and facts

b h .com b h .com bh .com b h .com h.c om


ob(p.- 365) A data warehouse
.u18. b- data on a specific.usubject
.uostores ob- over a period of time.
.uob
-
.uo b-b
w w w w w
ww TRUE ww ww ww ww

.c om h.co
m
h.c om h.c om h.c om
-bh
Dias - Chapter 11 #18
ob b- b b-b b-b b-b
w
Learning Goal: Understand how information is managed
.u w .uo w.u
o
w.u
o
w .uo
ww ww
Level of Learning: Knows basic terms and facts
ww ww ww

19. (p. 365) The proper management ofoinformation is the core ofomost companies' business.om
TRUE b h .com bh .c m b h .c m h.c h.c om
.uob- b- .uo b- .uo b-b .uo .uo b-b
w w w w w
ww ww ww ww ww
Dias - Chapter 11 #19
m om om om om
h.co
Learning Goal: Understand how information is managed
.c h.c h.c .c
b -bh
Level of Learning: Understands concepts and principles
- b-b b-b -bh
.uob .u ob .uo w.u
o
Rationale: The importance of information management cannot be overemphasized. For most companies, the proper management of information is the core of their
.u ob
w ww business.
ww
w
ww
w
ww ww
w

20. (p. 365) Information usefulness is based on six characteristics.om


h .com h .com h.c h.c om .c om
FALSE
b- b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
Dias - Chapter 11 #20
m om om om om
h.co
Learning Goal: Understand how information is managed
h.c
Level of Learning: Understands concepts and principles
b h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
Rationale: In managing information, we have to know what is useful and what is not useful. Usefulness is based on these four characteristics: quality, completeness,
w timeliness and relevance. w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
21. (p. 366) In Internet retail, data mining is called shopping cart analysis.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #21
Learning Goal: Understand how information is managed
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h h.c
Rationale: In Internet retail, data mining is called shopping cart analysis. Using shopping cart analysis, a manager can see what items people buy together and as a
b b b b
.uo b -
.uo b-
result make recommendations on product placement. o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
22. (p. 368) Wireless networking refers to the technology used to obtain an Internet connection without having to
connect .to
b h coamphone line or cablebline.
h.com b h .com b h .com b h .com
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #22
.com .com
Learning Goal: Describe various types of software and hardware
b h b h bh.co
m
h.c om h.c om
.uo b- o b-
Level of Learning: Knows basic terms and facts
.uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
23. (p. 368) Wi-Fi is the technology used to obtain an Internet connection without having to connect to a phone
line or cablemline.
TRUE b h .co bh .com b h .com b h .com b h .com
-
ob - - - -
w.u w .uob w.u
ob
w.u
ob
w .uob
ww ww ww ww ww
Dias - Chapter 11 #23
om .com
Learning Goal: Describe various types of software and hardware
.c h.c om .com h.c om
-bh h h
Level of Learning: Knows basic terms and facts
b b-b b b-b
ob ob- .uo .uo b- .uo
w.u w.u w w w
ww ww ww ww ww
24. (p. 369) An intranet consists of hardware and software that prevents outsiders from accessing information the
user does not want others to see.
m m m m m
FALSE h.co
-b h.co -b h.co -b h.co h.co -b -b
.uob w.u
ob
w.u
ob
w.u
ob
w.u
ob
www w w ww w w w w
Dias - Chapter 11 #24
Learning Goal: Describe various types of software and hardware
om
Level of Learning: Knows basic terms and facts
h.c h .com h.c om h.c om .c om
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o .u o
ww ww ww w w w ww
25. (p. 369) An intranet is a companywide network, closed to public access that uses Internet-type technology.
TRUE
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww Dias - Chapter 11 #25 ww
Learning Goal: Describe various types of software and hardware
ww ww ww
Level of Learning: Knows basic terms and facts

bh .com h.c om h .com h.co


m
h.c om
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
26. (p. 370) An extranet is a semiprivate network that uses Internet technology and allows more than one company
to access.cthe
h omsame information orhallows
.com people on different h com to collaborate. bh.com
.servers h .com
b b b b
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #26
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
27. (p. 371) A virtual private network is a private data network that creates secure connections or "tunnels" over
regular Internet m lines.
TRUE b h . c o
b h.com b h .com b h .com bh .com
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uob
w w ww ww ww ww
Dias - Chapter 11 #27

.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
28. (p. 371) A gateway is an entry point into a Web site.
FALSE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww Dias - Chapter 11 #28 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts

b h .com bh .com b h .com b h.com h.c om


ob(p.- 372) Shareware is copyrighted
.u29. .uob
- ob-
.upotential b-
uocharge.
.of .uo b-b
w w but distributed
w to customers free
w w
ww TRUE ww ww ww ww

h .com h .com h .com h.c om .c om


b
ob- -Chapter 11 #29 b- b - b b-b -bh
w.uDias
Learning Goal: Describe various w .uofosoftware
types and hardware w .uob w.u
o
w .u ob
ww Level of Learning: Knows basic
ww terms and facts ww ww ww

o m o m .cotaking. m om om
h.cPublic
30. (p.b374) domain softwareb his.csoftware that is free for
b hthe h.c -bh
.c
ob
.uTRUE
-
.uob
-
.uob
- o b-b ob
w w w w.u w .u
ww ww ww w w ww

m om om om om
h.co
Dias - Chapter 11 #30
h.c
Learning Goal: Describe various types of software and hardware
b h.c bh.c h.c
.uo b -
.uo b-b
Level of Learning: Knows basic terms and facts
.uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
31. (p. 368) IBM is working on a solution to computer breakdowns called SMASH.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #31
Learning Goal: Describe various types of software and hardware
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: IBM is working on a solution to computer breakdowns with an approach called SMASH: simple, many and self-healing. The hope is to build computers
b b b b h.c
.uo b -
.uo b- o b-
made of many small components that have the ability to monitor their own performance and solve problems. ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
32. (p. 368) Wireless networking has set the common PC free from cords.
TRUE .com .com .com om m
h -bh h h.c h.co
o b-b .uob .uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #32
Learning Goal: Describe various types of software and hardware

.com .com m om om
Level of Learning: Understands concepts and principles
b h b h h.co h.c
Rationale: Wireless networking refers to the ability of a computer or device to transport signals through the air and without cords.
b h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
33. (p. 368) The Wi-Fi available in Panera Bread allows users with wireless laptops to connect to the Web.
TRUE
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww Dias - Chapter 11 #33 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
om .com om .com
Rationale: Wi-Fi or wireless fidelity is the technology used to obtain an Internet connection without having to connect to a phone line or cable line. This is available in
.c h.c h.c om
-bh h h
Panera Bread and other restaurants.
b b-b b b-b
ob ob- .uo .uo b- .uo
w.u w.u w w w
ww ww ww ww ww
34. (p. 371) A VPN allows a company to have privacy and security in its network.
TRUE
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #34 ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines. Companies can use
h.c om .com h.c om h.c om
public lines securely. VPNs provide secure sharing of public resources for data and allow for on-demand networking: an authorized user can join the network for any
h .c om
b-b b- b b-b
desired function, at any time, for any length of time, while keeping the corporate network secure. b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
35. (p. 371) It is important to find the right software before finding the right hardware.
TRUE om om om om om
h.c h.c h.c bh.c h.c
.uo b-b .uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww
Dias - Chapter 11 #35
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles

bh .com h.c om .com h.co


m
Rationale: Although many people looking to buy a computer think first of the equipment, it is important to find the right software before finding the right hardware.
h h.c om
b- b-b b- b
Some programs are easier to use than others. Some are more sophisticated and can perform more functions than others.
.uo .uo .uo o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
36. (p. 372) A healthcare provider might use an expert system to diagnose a skin problem experienced by someone

b .com
in her early
h
20s.
b h .com bh .com b h .com b h .com
ob-
TRUE ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #36
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Understands concepts and principles
.uo b .uo o b- ob- o b-b
w w.u w.u w.u
Rationale: An expert system is a type of software that is meant to solve problems in a variety of industries. The doctor would input the symptoms and the possible issues
w
ww would then be viewable. ww w w ww w w

37. (p. 375) cAophish


b h . m is a piece of programming
b h.com code inserted into
b h .coother
m programming to cause
b h .comsome unexpected bh.com
and
obfor
- the victim, usually undesirable,
- event. - - -
w.uFALSE w .uob w .uob w .uob w .uob
w w w w w w w w w w

h .com
Dias - Chapter 11 #37
b b h.com bh.co
m
h.c om h.c om
b- b-
Learning Goal: Discuss challenges in information technology
.uo o .uo b-
.uo b-b .uo b-b
w w.u
Level of Learning: Knows basic terms and facts w w w
ww w w ww ww ww

38. (p. 377) Anmencryption is a secret code mgiven to information.cwhen


m it is passing through.cthe
mInternet.
TRUE .c o . c o o o h.c om
ob-bh -bh -bh -bh b-b
w.u w .uob w.u
ob
w.u
ob
w .uo
ww ww ww ww ww
Dias - Chapter 11 #38
om .com
Learning Goal: Discuss challenges in information technology
.c h.c om .com h.c om
-bh h h
Level of Learning: Knows basic terms and facts
b b-b b b-b
ob ob- .uo .uo b- .uo
w.u w.u w w w
ww ww ww ww ww
39. (p. 377) Cookies are pieces of information sent by a Web site over the Internet to your Web browser.
TRUE
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #39 ww ww ww ww
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts

h.c om h .com h.c om h.c om .c om


o b-b o b- b
o b-b o b-b ob -bh
w w.u40. (p. 378) Instability inwtechnology
w.u may be caused
w wby.uhuman error. w w.u w .u
w TRUE w w w ww

bh .com b h .com h.c om


bh.c
om h.c om
ob- -Chapter 11 #40
.uDias
-
uob technology .uo b-b ob- .uo b-b
w Learning Goal: Discuss w
challenges in.information w w.u w
ww Level of Learning: Knows basic ww terms and facts ww ww ww

bh .com h.c om h .com h.co


m
h.c om
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
41. (p. 378) Computer viruses can often cause instability in technology.
TRUE .com .com .com om om
h h -bh h.c -bh
.c
.uo b-b o b-b .uob o b-b ob
w w.u w w.u w .u
ww w w ww ww ww
Dias - Chapter 11 #41
Learning Goal: Discuss challenges in information technology
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- ob- o b-b
w w.u w w.u w w.u w.u w.u
w w
42. (p. 379) All the information w
found online is reliable. ww w w
FALSE

h.c om h.com h.c om h.c om h.co


m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.uDias - Chapter 11 #42 w w w.u w
w ww
Learning Goal: Discuss challenges in information technology ww ww ww
Level of Learning: Knows basic terms and facts

b h .com b h.com bh .com h.c om h.c om


ob(p.- 374 - 375) Computers today
.u43.
-
.uob are still susceptiblewto b-
.uohackers. .uo b-b .uo b-b
w w w w
ww TRUE ww ww ww ww

.c om h.co
m
h.c om h.c om h.c om
-bh
Dias - Chapter 11 #43
ob b- b b-b b-b b-b
w
Learning Goal: Discuss challenges in information technology
.u w .uo w.u
o
w.u
o
w .uo
ww ww
Level of Learning: Understands concepts and principles
ww ww ww
Rationale: Hackers are people who break into computer systems for illegal purposes, such as transferring funds from someone's bank account to their own without
authorization. One ongoing problem with computer technology, which is likely to persist in the future is that computers are susceptible to hackers.

b h .com b h .com b h .com b h.com h.c om


ob(p.- 375) To protect from.uviruses
.u44. ob- computer users should - -
.uob practice "safe computing".
.uob .uo b-b
w w w w w
ww TRUE ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
b-b b-b
Dias - Chapter 11 #44
-
.uob ob
Learning Goal: Discuss challenges in information technology
.u .uo w.u
o .u ob
w ww ww
w
Level of Learning: Understands concepts and principles
ww
w
ww ww
w
Rationale: Computer users should keep their antivirus protection program up-to-date and, more important, practice "safe computing" by not downloading files from
unknown sources and by scanning file storage devices, such as CDs and USB flash drives, before accessing any of the files on them.

h .com h .com h.c om h.c om .c om


b
ob(p.- 376) E-mail is private.uand
45. b
ob-secure. b-b b-b b -bh
w .uFALSE w w .uo w.u
o
w .u o
ww ww ww w w ww

m om om om om
h.co
Dias - Chapter 11 #45
b h.c h.c bh.c h.c
.uo b -
.uo b-b
Learning Goal: Discuss challenges in information technology
.uo b-b ob- .uo b-b
w w
Level of Learning: Understands concepts and principles w w.u w
ww ww ww ww ww
Rationale: E-mail is no more private than a postcard. You do not need to be the target of a criminal investigation to have your e -mail reviewed by someone in your
company or in your personal life. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
46. (p. 359) The name for business technology in the 1970s was __________. Its primary purpose was to improve
the flow.of m
cofinancial information. .com .com .com .com
b h b h bh b h b h
ob- processing
data ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #46
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
47. (p. 359) Raw, unanalyzed and unorganized facts and figures are called __________.
data m m m
h.c o h.co h.c o h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #47
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts

b h .com b h.com bh.co


m
h.c om h.c om
o b- .uo b- o b
o- ob-b b-b
w w.u48. (p. 359) __________wiswthe processed and w.u data that can be usedwfor
organized
w w.umanagerial decision w w.u
making.
w w w w w
Information

b h .com bh.co
m
h.com h.c om h.c om
ob- -Chapter 11 #48
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts

com
h. __________ is the name . com . com
h. com
. com
49.b(p.-b359)
o o b -bh for the business technology
o b-bh of the 1980s. Its role
o b -bchanged from supporting
o b -bh
w.uthe business to doing w w.u Technology suchwas
business. u
w.ATMs w.u
and voice mailware examples. w.u
ww Information systems w w w ww

h .com h .com h .com h.com .c om


b
ob- -Chapter 11 #49 - b - b b-b -bh
w.uDias
Learning Goal: Explain w
information
.uob role in business
technology's w .uob w.u
o
w .u ob
ww Level of Learning: Knows basicww terms and facts ww ww ww

m m m m m
h.cIno the 1990s the name-bgiven
50. (p.b361)
- h.co to business technology
- b
o __________. Its role
h.cwas - b
o
h.cbecause the way of bh.co
-
ob business, rather than
.udoing b using technology to.uhelp
.uojust ob with business functions.
.uob .uob
w w w w w
ww Information technology ww ww ww ww

bh . com b h .com b h . com bh.c


om h.c om
Diasb- -Chapter 11 #50 -
.uob role in business
o Goal: Explain information technology's
.uLearning .uob
- ob- .uo b-b
w w w w.u w
ww Level of Learning: Knows basic
ww terms and facts ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
51. (p. 362) __________ is accessibility through technology that allows business to be conducted anywhere at any
time. .com .com .com .com .com
b h b h bh b h b h
ob-
Virtualization ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #51
m .com .com .com om
bh.co
Learning Goal: Explain information technology's role in business
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
52. (p. 362) __________ allows businesses to communicate in real time, for free, via computer.
Instant messaging
m m m m m
h.c o h.co h.c o h.c o h.co
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #52
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts

b h .com b h.com bh.co


m
h.c om h.c om
o b- .uo b- o o b- b-b .uo b-b
w w.u53. (p. 363) __________wiswany electronic business
w w.u exchange using any w
data w.u
electronic device. w
w w w w ww
e-business

b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #53
.uDias .uo b-
.uo b-b o b-b .uo b-b
w w w w.u w
ww w
w technology's role in business w
Learning Goal: Explain information w ww ww
Level of Learning: Knows basic terms and facts

com
h. Selling products or services
. com . . com com h.c om
54.b(p.-b363)
o o b -bh online through e-business
o b-bh is called __________.
o b -bh b-b
.u .u .u .u .uo
www e-commerce ww w ww ww
w w ww
w

m om om om om
h.co
Dias - Chapter 11 #54
b -bh
.c h.c h.c -bh
.c
.uob
- b
Learning Goal: Explain information technology's role in business
.u o .uo b-b o b-b ob
ww
Level of Learning: Knows basic terms and facts
w w w.u w .u
w ww ww ww ww
55. (p. 364) Any business participating in e-__________ is engaging in e-__________.
om om om om om
bh.c business
commerce;
- bh.c bh.c bh.c -bh
.c
.uob .u ob- .u ob- .uob
-
.u ob
w w ww ww ww w
w w w w ww
Dias - Chapter 11 #55
Learning Goal: Explain information technology's role in business
m om om om om
h.co h.c
Level of Learning: Understands concepts and principles
b h.c bh.c h.c
- b-b b-b ob- b-b
Rationale: Any business participating in e-commerce is engaging in e-business, while a business may engage in e-business without necessarily doing e-commerce.
.uo b .uo .uo .uo
w w w w.u w
ww ww ww ww ww
56. (p. 364) The phenomenon of information overload in business is called __________.
infoglut om om om m om
h.c h.c h.c h.co h.c
.uo b-b .uo b-b .uo b-b o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww
Dias - Chapter 11 #56
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
57. (p. 365) A(n) __________ stores data on a specific subject over a period of time.
.com
data warehouse
h .com h .com h.c om .c om
b-b b-b -bh b-b -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
Dias - Chapter 11 #57
Learning Goal: Understand how information is managed
m
Level of Learning: Knows basic terms and facts
.com .com .com om
bh.co b h b h b h h.c
o b - o b- o b- o ob- b-b
w w.u w w.u w w.u w w.u w w.u
w w is looking for hidden patterns
58. (p. 365) __________ w in the data in a datawwarehouse and discovering
w
relationships among the data.
Data mining m
h.c o h.com h.c om h.c om h.co
m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #58
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts

b h .com b h.com bh.co


m
h.c om h.c om
o b- o b- o b-
.uo b-b .uo b-b
w w.u59. (p. 366) In Internet retail,
w w.udata mining is calledw__________.
w.u w w
w w w ww ww
shopping cart analysis

b h .com bh.co
m
h.c om h.c om h.c om
ob- -Chapter 11 #59
.uDias .uo b- o b-b o b-b .uo b-b
w w w.u w.u w
ww w
w information is managed
Learning Goal: Understand how ww ww ww
Level of Learning: Knows basic terms and facts

com
h. To manage information, . com bh. four characteristics: bh. com . com com
60.b(p.-b365)
o ob -bhusefulness is based oon
b-these o b -__________, o b -bh
completeness,
w.utimeliness and relevance.w.u w.u w.u w.u
ww quality ww ww ww ww

h .com h .com h.c om h.c om .c om


b
ob- -Chapter 11 #60 - b b-b b-b -bh
w.uDias
Learning Goal: Understand how w .uob is managed
information w .uo w.u
o
w .u ob
ww Level of Learning: Understands
wwconcepts and principles ww ww ww
Rationale: In managing information, we have to know what is useful and what is not useful. Usefulness is based on these four characteristics: quality, completeness,
timeliness and relevance.

h.c om h .com h.c om .c h.c om om


o b-b o b- b
o o b-b ob -bh b-b
w.u61. (p. 368) __________wrefers
w.u to the ability of a computer
w.u or device to transport
w.usignals through the air.w.u
ww Wireless networking w ww ww ww

bh .com b h .com b h .com bh.c


om h.c om
ob- -Chapter 11 #61
.uDias b-
.uofosoftware .uob
- ob- .uo b-b
w Learning Goal: Describe various w
types and hardware w w.u w
ww Level of Learning: Knows basicww terms and facts ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
62. (p. 368) The technology used to obtain an Internet connection without having to connect to a phone line or
cable line
h om
.cis called __________. .com
h h .com h .com h .com
b b b b b
ob- fidelity (Wi-Fi) ob-
wireless ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #62
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
63. (p. 369) A(n) __________ is a companywide network, closed to public access that uses Internet-type
technology. m
intranet
b h .co b h.com b h .com b h .com bh.co
m
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uo b
w w ww ww ww ww
Dias - Chapter 11 #63

.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
64. (p. 369) A(n) __________ can consist of hardware or software and prevents outsiders from accessing
information the user does not want others to see.
m m m m om
firewall
-b h.co h.co h.co h.co h.c
.uob .uo b-b o b-b o b-b .uo b-b
w w w.u w.u w
ww ww ww ww ww
Dias - Chapter 11 #64
Learning Goal: Describe various types of software and hardware
om .com
Level of Learning: Knows basic terms and facts
.c h.c om .com h.c om
ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww
65. (p. 370) A(n) __________ is a semiprivate network that uses Internet technology and allows more than one ww
company to access the same information or allows people on different servers to collaborate.
extranet com com com com om
. . h. h. .c
ob -bh ob -bh b-b b-b b -bh
.u .u .uo w.u
o .u o
www ww
w
ww
w
ww ww
w
Dias - Chapter 11 #65
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts
h.c om h .com h.c om h.c om .c om
o b-b o b- b
o o b-b b-b ob -bh
w w.u w w.u w w.u w w.u w .u
w 66. (p. 370) __________
w are people who break into
w computer systems for w
illegal purposes. ww
Hackers
m om om om om
bh.co h.c h.c bh.c h.c
o
.uDiasb - o b-b o b-b ob- .uo b-b
w - Chapter 11 #66 w.u w.u w.u w
ww w
w types of software and hardware w
Learning Goal: Describe various
w ww ww
Level of Learning: Knows basic terms and facts

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
67. (p. 371) A(n) __________ is a private data network that creates secure connections or "tunnels", over regular

b com
Internet .lines.
h b h .com bh .com b h .com b h .com
ob- private network ob-
virtual ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #67
m .com .com .com om
bh.co
Learning Goal: Describe various types of software and hardware
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
68. (p. 372) Software that is copyrighted but distributed to potential customers free of charge is called
__________.m
shareware
b h .co b h.com b h .com b h .com bh.co
m
ob - - - - -
w.u w .uob w .uob w.u
ob
w .uo b
w w ww ww ww ww
Dias - Chapter 11 #68

.com .com m om om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b b h bh.co h.c h.c
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
69. (p. 368) IBM is working on a solution to __________ with an approach called SMASH: simple, many and
self-healing.
m m m m om
computer
-b h.cobreakdowns h.co h.co h.co h.c
.uob .uo b-b o b-b o b-b .uo b-b
w w w.u w.u w
ww ww ww ww ww
Dias - Chapter 11 #69
Learning Goal: Describe various types of software and hardware
om .com
Level of Learning: Understands concepts and principles
.c h.c om .com h.c om
-bh ob-
bh
b-b b- b h
Rationale: IBM is working on a solution to computer breakdowns with an approach called SMASH: simple, many and self-healing. The hope is to build computers
ob b-b
w.u w.u .uo
made of many small components that have the ability to monitor their own performance and solve problems.
w w .uo w .uo
ww ww ww ww ww
70. (p. 368) The technology that allows you to connect your laptop to the Internet in a hotel, an airport or Panera
Bread is
b h com __________. bh.com
.called b h .com b h .com b h .com
ob- (wireless fidelity).uob-
.uWi-Fi .uob
-
.uob
-
.uob
-
w w w w w
ww ww ww ww ww

Dias - Chapter 11 #70


h.c om .com
Learning Goal: Describe various types of software and hardware
h h.c om h.c om .c om
b-b b- b
Level of Learning: Understands concepts and principles b-b b-b b -bh
w .uo w .uo w .uo w.u
o
Rationale: Wireless fidelity (Wi-Fi) is the technology used to obtain an Internet connection without having to connect to a phone line or cable line. w .u o
ww ww ww w w ww
71. (p. 375) A(n)m __________ is a piece of
m programming code inserted m into other programming m to cause some
unexpected
b h . c o and for the victim, .c
usually
b h o undesirable, event.
b h . c o
b h . c o
b h .com
ob- ob- ob- ob- ob-
w.uvirus w.u w.u w.u w.u
ww ww ww ww ww

.com
Dias - Chapter 11 #71
bh h.c om h .com h.co
m
h.c om
.uo .uo b-b
Learning Goal: Discuss challenges in information technology
b-
Level of Learning: Knows basic terms and facts
.uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
72. (p. 377) Most e-mail travels over the Internet in __________ plain text, meaning that the information can be
viewed by m
.coanyone. .com .com .com .com
b h b h bh b h b h
ob-
unencrypted ob- ob- ob- ob-
w.u w.u w.u w.u w.u
ww ww ww ww ww
Dias - Chapter 11 #72
m .com .com .com om
bh.co
Learning Goal: Discuss challenges in information technology
b h b h b h h.c
- b-
Level of Learning: Knows basic terms and facts
.uo b .uo o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
73. (p. 377) Web sites often send __________ to your computer that stay on your hard drive.
cookies m m m m m
h.c o h.co h.c o h.c o h.co
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww
Dias - Chapter 11 #73
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts

b h .com b h.com bh.co


m
h.c om h.c om
o b- o b- o .uo b- o b-b b-b
w w.u74. (p. 379) When evaluating
w w.udata on the Internet, wconsider
w.u __________. How
w wreliable and free from w.isu the
error
w
w w w w w
information?
accuracy
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww Dias - Chapter 11 #74 ww ww ww ww
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts

b h .com bh .com b h .com b h.com b h .com


ob(p.- 379) When evaluating.udata
.u75. ob- on the Internet, consider - -
.uob __________. Is thewinformation
.uob presented with.ua ob
-
w w w w
ww minimum of bias? ww ww ww ww
objectivity
h .com .c om h.c om h.c om .c om
- b -bh b-b b-b -bh
w.uob w .u ob
w .uo w.u
o
w .u ob
w w Dias - Chapter 11 #75 ww ww ww ww
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts

h.c om .com h.c om h.c om om


b-b b- b h
b-b b - bh.c b-b
o o o o o
w.u76. (p. 376) If 30 terrorists
wwith
.u __________ skills and
w.u$10 million attackedwthe
w.U.S.
u today, they could shut
w.udown
ww entire communications, ww money supply, electricity
ww and transportation systems.
w ww
hacker
m om om om om
bh.co h.c h.c bh.c h.c
o b
.uDias
- o b-b .uo b-b ob- .uo b-b
w - Chapter 11 #76 w.u w w.u w
ww w
w in information technology
Learning Goal: Discuss challenges ww ww ww
Level of Learning: Understands concepts and principles
Rationale: According to Mike McConnell, former director of the National Security Agency, if 30 terrorists with hacker skills and $10 million attacked the U.S. today,
they could shut down entire communications, money supply, electricity and transportation systems.

bh .com h.c om h .com h.co


m
h.c om
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
77. (p. 376) More than __________ of U.S. companies scan employee e-mail regularly and legally.
one-fourth
h .com .com h .com .com .c om
b-b b-b -bh b-b
h -bh
w .uo w.u
o
w .uob w.u
o
w .u ob
ww w w ww ww ww
Dias - Chapter 11 #77
Learning Goal: Discuss challenges in information technology
m .com
Level of Learning: Understands concepts and principles
.com .com om
h.co h h h
Rationale: E-mail is no more private than a postcard. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.
b b b b h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww w w ww w w
78. (p. 359) In the 1970s business technology was known as _________________.
A. Data processing
b .com systems
B. Information
h b h.com b h .com b h .com bh.co
m
- - - - -
w.uC.obData analysis w .uob w .uob w .uob w .uo b
ww D. Information technologyww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
.uo b-
Dias - Chapter 11 #78
o b- .uo b-
.uo b-b .uo b-b
w w.u
Learning Goal: Explain information technology's role in business
w w w
ww w
Level of Learning: Knows basic terms and facts
w ww ww ww

79. (p. 359) c__________ is/are raw, unanalyzed and unorganizedcofacts


b h . om bh .com b h . m and figures. bh.com h.c om
A. Information
-
.uB.obSpreadsheets .uob
-
.uob
-
.uob
-
.uo b-b
w w w w w
ww C. Data ww ww ww ww
D. Numeracy
.c om .com h.c om .com h.c om
ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww Dias - Chapter 11 #79 ww ww ww ww
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts

b h .com b h .com b h .com b h .com b h .com


ob(p.- 359) __________ is/are
.u80. b- processed and organized
.uothe
-
.uob data that can be used ob-managerial decision making.
.ufor .uob
-
w w w w w
ww A. Data ww ww ww ww
B. Information
C. Knowledge
.com
D. Intelligence
h h .com h.c om h.c om .c om
- b b- b b-b b-b -bh
w .uob w .uo w .uo w.u
o
w .u ob
ww ww ww w w ww
Dias - Chapter 11 #80
m om
Learning Goal: Explain information technology's role in business
om om om
h.co
Level of Learning: Knows basic terms and facts
b h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
81. (p. 359) In the 1980s business technology was known as _____________________.
com
A. Data .processing
h h .com h .com h .com .c om
- b
B. Information systems - b - b - b -bh
w .uC.obData analysis w.uob w .uob w .uob w .u ob
ww ww ww ww ww
D. Information technology

m .com .com .com om


bh.co b h b h b h h.c
.uDias b -
o - Chapter 11 #81 .uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
w w ww w w

om
h.cIn the 1990s business-btechnology
82. (p.-b361) h.c om .c
then became known .c om om h.co
m
o b ob o b -bh as _________________.
o b -bh b- b
w.uA. Data processing ww.u w.u w.u w .uo
ww B. Information systems w ww ww ww
C. Data analysis
D. Informationom technology om om om om
h.c h.c h.c h.c h.c
.uo b-b o b-b .uo b-b .uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
Dias - Chapter 11 #82
Learning Goal: Explain information technology's role in business
Level of Learning: Knows basic terms and facts
.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
.u uo
w.wireless
w 83. (p. 362) Blackberrieswor
o
w.uencourage __________
o
wor.uindependence of location.
w.u
o
w w w laptop w
computers
w w w w w
A. Virtualization
B. Instant messaging
C. Wi-Fi
b h .com bh .com h.c om h.com h.c om
-
.uD.obViral marketing ob- .uo b-b .uo b- b
.uo b-b
w w.u w w w
ww ww ww ww ww

m
Dias - Chapter 11 #83
om om om om
h.co -bh
.c
Learning Goal: Explain information technology's role in business
b h.c h.c -bh
.c
.uob
- ob
Level of Learning: Understands concepts and principles
.u .uo b-b o b-b ob
ww w w w.u w .u
Rationale: Virtualization is accessibility through technology that allows business to be conducted anywhere at any time. For example, you can carry a virtual office
w ww ww
using such tools as Blackberries or wireless-enabled laptop computers. ww ww

84. (p. 362


h omThe advantage to IM
.-c363) h .in m
cobusiness .com
is that ___________________.
h h .com .c om
- b - b - b - b -bh
w .uA.obIt is immediate w .uob w .uob w.uob w .u ob
ww B. There is no incrementalww cost ww ww ww
C. Business professionals can participate in multiple conversations at once
D. All of the above are advantages to IM
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww Dias - Chapter 11 #84
ww ww ww ww
Learning Goal: Explain information technology's role in business
Level of Learning: Understands concepts and principles

.com om .com m om
Rationale: Instant messaging (IM) allows business professionals to participate in multiple conversations at once. The advanta ge to IM in business is that IM is
h h.c h h.co
immediate, even more so than e-mail and there is no additional incremental cost, which makes overseas communication easier and cheaper.
b h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
85. (p. 364) Information overload in business is also called ____________________.
A. Infoglut
h .com h .com h .com h .com .c om
- b
B. Infoquan - b - b - b -bh
w .uC.obInfosum w .uob w .uob w .uob w .u ob
ww ww ww ww ww
D. Overinfo

m .com .com .com om


bh.co b h b h b h h.c
b -
o - Chapter 11 #85
.uDias .uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
w w ww w w

om
h.cA(n) __________ stores
86. (p.-b365) .c om .c om .c om h.co
m
o b ob -bh data on a specific subject
o b -bhover a period of time.
o b -bh b- b
w.uA. Data handler w.u w.u w.u w .uo
ww B. Info handler ww ww ww ww
C. Info warehouse
D. Data warehouse
om om om om om
h.c h.c h.c h.c h.c
.uo b-b o b-b .uo b-b .uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww
Dias - Chapter 11 #86
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts
.c om h.co
m
h.c om h.c om h.c om
ob -bh o b- b b-b b-b b-b
.u .uo
w.u for hidden patternswinwthe
w 87. (p. 365) __________wlooks
o o
w.u and discovers relationships
w.u
w w w w data in a data w
warehouse
w w w
among the data.
A. Data deciphering
b com
B. Datah.patterning
bh .com h.c om h.com h.c om
-
.uC.obData mining .uob
-
.uo b-b .uo b- b
.uo b-b
w w w w w
ww D. Data development ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
Dias - Chapter 11 #87
.u ob .uo b-b o b-b ob
ww
Learning Goal: Understand how information is managed
w w w.u w .u
w ww
Level of Learning: Knows basic terms and facts
ww ww ww

88. (p. 366) cInom


h . Internet __________, h .data
commining is called shopping
h .comcart analysis. h .com .c om
b
A. Manufacturing
- - b - b - b -bh
w .uB.obWholesaling w .uob w .uob w .uob w .u ob
ww ww ww ww ww
C. Retailing
D. Cooperatives
m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww Dias - Chapter 11 #88 ww ww ww ww
Learning Goal: Understand how information is managed
Level of Learning: Knows basic terms and facts

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
89. (p. 365) Usefulness is based on four characteristics: quality, completeness, timeliness and
.com
______________________.
h h .com h .com h .com .c om
- b
A. Accuracy - b - b - b -bh
w .uB.obLots of information w.uob w .uob w .uob w .u ob
ww ww ww ww ww
C. Quick retrieval
D. Relevance
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww Dias - Chapter 11 #89 ww w w ww w w
Learning Goal: Understand how information is managed
Level of Learning: Understands concepts and principles
Rationale: Usefulness is based on four characteristics: quality, completeness, timeliness and relevance.
h.c om h.com h.c om h.c om h.co
m
o b-b .uob
- b
o b-b o b-b .uo b- b
w w.u90. (p. 367) Hardware includes
w w w.u
w ______________________. w.u w
w w w ww ww
A. Computers
B. Pagers
C. IPods
b h .com b h.com bh.co
m
h.c om h.c om
-
.uD.obAll of the above o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww

om
Dias - Chapter 11 #90
.c h.co
m
h.c om h.c om h.c om
ob -bh
Learning Goal: Describe various types of software and hardware
b- b b-b b-b b-b
w .u w .uo
Level of Learning: Knows basic terms and facts
w.u
o
w.u
o
w .uo
ww ww ww ww ww
91. (p. 368) __________ refers to the ability of a computer or device to transport signals through the air.
A. Wireless
b h .comnetworking
bh .com b h .com b h.com b h .com
-
B. Wireless fidelity - - - -
w .uC.obWireless signaling w.uob w .uob w .uob w .uob
ww ww ww ww ww
D. Flexible wiring

h .com h .com h .com h.com .c om


b
ob- -Chapter 11 #91 - b - b b-b -bh
w.uDias w . uob w .uob w.u
o
w .u ob
ww Learning wwtypes of software and hardware ww
Goal: Describe various
Level of Learning: Knows basic terms and facts
ww ww

om
h.cThe technology used -to
92. (p.-b368)
om
.c an Internet connection.c .c om .c om om
b b bhobtain b-bh without having to connect
b -bh to a phone line orb -bh
o o o o o
w.ucable line is called _____________________.
w.u w.u w.u w.u
ww A. Wireless networking ww ww ww ww
B. High-fidelity
C. Wireless fidelity
D. Free b h .com
networking b h .com b h .com b h .com b h .com
- - - - -
w .uob w .uob w .uob w.u
ob
w .uob
ww ww ww ww ww
Dias - Chapter 11 #92

.com om .com m om
Learning Goal: Describe various types of software and hardware
h
Level of Learning: Knows basic terms and facts
b h.c h h.co h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
93. (p. 369) A(n) __________ is a companywide network closed to public access that uses Internet-type
technology.
b h .com b h .com bh .com b h .com b h .com
-
A. Extranet - - - -
w .uB.obIntranet w.uob w .uob w .uob w .uob
ww ww ww ww ww
C. Companet
D. Firewall
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww Dias - Chapter 11 #93 ww w w ww w w
Learning Goal: Describe various types of software and hardware
Level of Learning: Knows basic terms and facts

h.c om h.com h .com h .com h .com


b-b
o (p. 369) A(n) __________
.u94. b- b
.uoprevents outsiders from ob-
b
.uaccessing
- b
.uob the user does notwwant
corporate information .uob
- b
w w w w
ww others to see. ww ww ww ww
A. Intranet
B. Firewallom
.c .com h.co
m
h.c om h.c om
o b-bh
C. Extranet
o b- b h
b- b b-b b-b
w.uD. Castlewall w.u w .uo w .uo w .uo
ww w w ww ww ww

.c om
Dias - Chapter 11 #94
h.co
m
h.c om h.c om h.c om
ob -bh b- b
Learning Goal: Describe various types of software and hardware
b-b b-b b-b
w .u .uo
Level of Learning: Knows basic terms and facts
w w.u
o
w.u
o
w .uo
ww ww ww ww ww
95. (p. 371) Just as phone companies provide secure shared resources for voice messages, __________ provide the
same secure
b h .comsharing of public resources
bh .com for data. b h .com b h.com b h .com
- - - - -
w .uA.obVIPs w .uob w .uob w .uob w .uob
ww B. VPNs ww ww ww ww
C. EXNs
D. IMPs
m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w Dias - Chapter 11 #95
ww ww ww ww
Learning Goal: Describe various types of software and hardware
Level of Learning: Understands concepts and principles
om .com om om
Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines. The idea of the VPN is to
h.c h h.c h.c .c om
give the company the same capabilities at much lower cost by using shared public resources, rather than private ones.
b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww
96. (p. 372 - 373) Which of the following statements about computer software is true?
A. An expert system is a type of software that only expert users are qualified to use
.comis not copyrightedband
B. Shareware
b h h .coismfree for the taking bh.com b h .com h.c om
-
.uC.obGroupware is software ob-allows people to work
.uthat b-
.uocollaboratively and share ob-
.uideas .uo b-b
w w w w w
ww D. All of the abovewstatements
w are true ww ww ww

bh .com h.c om h .com h.co


m
h.c om
b-
Dias - Chapter 11 #96
.uo .uo b-b .uo b- b
o b - b
.uo b-b
w Learning Goal: Describe various types of software and hardware
w w w.u w
ww ww
Level of Learning: Understands concepts and principles ww w w ww
Rationale: An expert system is a type of software that is meant to solve problems in a variety of industries. Shareware is co pyrighted but distributed to potential
customers free of charge. Groupware is software that allows people to work collaboratively and share ideas. It runs on a network and allows people in different areas
to work on the same project at the same time.
m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
97. (p. 374) Which of the following is an information technology challenge?
.com security
A. Governmental
h h .com h .com h .com .c om
- b
B. Security - b - b - b -bh
w .uC.obStability w .uob w .uob w .uob w .u ob
ww ww ww ww ww
D. All of the above are IT challenges

m .com .com .com om


bh.co b h b h b h h.c
.uDiasb -
o - Chapter 11 #97 .uo b- o b- ob- o b-b
w w w.u w.u w.u
ww ww
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts
w w ww w w

om
h.cProgramming codes inserted
98. (p.-b375)
om
.c into other programming .c om
h.c are called .c om om
o b ob -bh o b -bh to cause unexpected
o b -bevents o b-bh
w.u________________________.
w.u w.u w.u w.u
ww A. Viruses ww ww ww ww
B. Beetles
C. Phishesom
h
D. Gorillas
b .c b h.com bh .com b h .com b h .com
- - - - -
w .uob w.u
ob
w .uob w .uob w .uob
ww w w ww ww ww
Dias - Chapter 11 #98
om m
Learning Goal: Discuss challenges in information technology
.c h.co h.c om h.c om h.c om
ob -bh
Level of Learning: Knows basic terms and facts
b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww
99. (p. 376) What percentage of the systems the government needs to protect is in the private sector?
A. 10
B. 30 h.com h .com h .com h.com h .com
- b - b - b - b - b
w .uC.ob50 w .uob w .uob w .uob w .uob
ww D. 85 ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
Dias - Chapter 11 #99
.u ob .uo b-b o b-b ob
ww
Learning Goal: Discuss challenges in information technology
w w w.u w .u
w ww
Level of Learning: Knows basic terms and facts
ww ww ww

100. (p. 377)coMost


b h . m e-mail travels over
b h .cthe
omInternet in __________
b h .coplain
m text, meaning that.cthe
b h ominformation being h.com
b
sent
ob-is not in a secret code.uand
ob-anyone can view it. .uob- ob- ob-
w . u w w w. u w . u
ww A. Completely ww ww ww ww
B. Unencrypted
C. Uncoded
D. Pure .com .com .com .com .com
ob -bh ob -bh ob -bh ob -bh ob -bh
w.u w.u w.u w.u w.u
ww ww ww w w ww
Dias - Chapter 11 #100
Learning Goal: Discuss challenges in information technology

.com om .com m om
Level of Learning: Knows basic terms and facts
bh h.c h h.co h.c
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
101. (p. 377) A(n) __________ is a piece of information sent by a Web site over the Internet to your Web browser

b h .com is expected to save


that the browser
b h om send back to the server
.cand bh
m
.cowhenever b h .com
the user returns to that Web site.
b h .com
-
A. Danish - - - -
w .uB.obRetro w.uob w .uob w .uob w .uob
ww ww ww ww ww
C. Cookie
D. Candy
m .com .com .com om
bh.co b h b h b h h.c
.uo b -
.uo b- o b- ob- o b-b
w w w.u w.u w.u
ww Dias - Chapter 11 #101 ww w w ww w w
Learning Goal: Discuss challenges in information technology
Level of Learning: Knows basic terms and facts

h.c om h.com h .com h .com h.co


m
.u102. b-b - b
.uob statements about
o (p. 376) Which of the following ob-
b
.ugovernment security is w .uob
-
correct?
b
.uo b- b
w w w w
ww A. Today most government
ww wwabout hackers and credit
officials are worried wwcard fraud ww
B. Government agencies need only secure government computers to secure the country
C. Technologyom workers are reluctant to give information to theogovernment
D. Allb h
of.cthe above statements are
b h com
.correct bh .c m b h .com h.c om
.uob
- - ob - -
.uob .uob .uo b-b
w w.u w w w
ww w w ww ww ww
Dias - Chapter 11 #102
om m
Learning Goal: Discuss challenges in information technology
.c h.co h.c om h.c om h.c om
ob -bh
Level of Learning: Understands concepts and principles
b- b b-b b-b b-b
w w .uo w.u
o
security breaches and lose faith in the company's ability to protect its assets and reputation. w.u
o
w .uo
Rationale: Technology workers are reluctant to give information to the government in exchange for increased protection for fear tha t the public will find out about
.u
ww ww ww ww ww

103. (p. 377) Which


m of the following .statements
m about privacy on the m Internet is correct? .com
A. U.S.b h . c o
companies are not h
allowed
b c o
by law to scan employeeb h . c o
e-mail b h b h .com
- b- ob- - -
w .uB.obMost e-mail travels over
w .uothe Internet in encrypted
w .utext w .uob w .uob
ww C. The Internet allows wwWeb surfers to access w w
all sorts of information aboutww both business and individual
ww Web
sites
D. All of the omabove statements are correct
om om om om
.c h.c bh.c bh.c .c
b -bh -b ob- - -bh
.u o .uob w.u .uob .u ob
w ww ww
w
ww ww
w
ww
w
Dias - Chapter 11 #103
Learning Goal: Discuss challenges in information technology
Level of Learning: Understands concepts and principles
h.c om .com h.c om h.c om
Rationale: U.S. companies are legally allowed to scan employee e-mail and about 25% of them do so. Most e-mail travels over the Internet in unencrypted text. The
h .c om
b-b b- b b-b
Internet allows Web surfers to access all sorts of information about both business and individual Web sites. b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww

m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
104. Explain three ways that information technology is changing business.

b h .com b h .com bh .com b h .com b h .com


ob- should describe .three
.u[Student
- -
uob of the following.] Organization:
.uob
- down corporate barriers,
Technology is ubreaking
. ob .uob
-
w w w w w
ww allowing functionalwdepartments
w or product groups
ww (even factory workers)wwto share critical information
ww instantly.
Operations: Technology shrinks cycle times, reduces defects and cuts waste. Service companies use technology
to streamline ordering and communication with suppliers and customers. Staffing: Technology eliminates layers
b .com and cuts the number
of management
h b h.coofmemployees. Companies
b h
m computers and telecommunication
.couse b h.com b h .com
ob-
.uequipment to create "virtual b-
.uooffices" with employees
.uin
-
obvarious locations. New.uo b-
products: Information .uob-
w w w w w
ww technology cuts development
ww wwcustomer and marketingwcomments
cycles by feeding w ww
to product development
teams quickly so that they can revive products and target specific customers. Customer relations: Customer
service representatives can solve customers' problems instantly by using companywide databases to complete
tasks from m
.cochanging .com bills. Information
addresses tohadjusting om
.cgathered .com interactions canbh.com
from customerhservice
b h b b h b
ob- strengthen customer
.ufurther b-
.uorelationships. New markets: -
.uob Since it is no longer uob
-
.necessary ob-
for customers to.uwalk
w w w w w
ww down the street to get wwto stores, online businesses
ww can attract customers w towwhom they wouldn't otherwise
ww have
access.

b h .com b h.com bh.co


m
h.c om h.c om
b-
o - Chapter 11 #104
.uDias o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww

105. In managing
m information, we .have mto know what is useful and
m what is not useful. .Describe
m the four
.c o
characteristics of usefulness. -bh c o .c o c o h.c om
ob -bh -bh -bh b-b
w.u w .uob w.u
ob
w.u
ob
w .uo
ww ww ww ww
Quality: Quality means the information is accurate and reliable. Completeness: There must be enough ww
information to allow individuals to make a decision but not so much as to confuse the issue. Today, the problem
is often tooom
much information rather othan too little. Timeliness:oInformation must reach business owners and
managers
b h .cquickly. If informationbh .c mtoo long to pull upbith.may
takes
c m
be virtually useless,
b h.com a decision maybh.com
because
ob- have been made. .Relevance:
.ualready uob
-
Information systems
-
.uob often provide us with b-
.uotoo much data.
b-
.uoneed
Managers
w w w w w
ww to learn to ask the right
ww questions, in order to w w ww
get the relevant data they need. ww

h .com .com h.com h.com .c om


b
ob- -Chapter 11 #105 ob -bh b-b b-b b -bh
w.uDias w .u w .uo w.u
o
w .u o
w w ww ww ww ww
106. Explain the difference between shareware and freeware.
b h .com b h .com b h .com b h .com b h .com
ob-
.uShareware
-
.uisobcopyrighted but distributed
is software that -
.uob to potential customers b- of charge. The users.uare
.uofree ob-
w w w w w
ww asked to send a specified
ww fee to the program Limewire.
ww ww
Limewire is a peer-to-peer wwfor Java
file-sharing client
platform. The shareware concept has become very popular and has dramatically reduced the price of software.
Public domain software (freeware) is software that is free for the taking. The quality of shareware and freeware
m m m m m
h.co
varies greatly.
-b h.co -b h.co -b h.co -b h.co -b
ob ob ob ob ob
w.u w.u w.u w.u w.u
ww ww ww w w ww
Dias - Chapter 11 #106

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww www w w
107. List the information technology challenges of today.
h .com h .com h.co
m
h.c om .c om
b- b and viruses uob- b - b b-b -bh
w .u1.oHackers w. w .uob w.u
o
w .u ob
ww 2. Governmental securityww ww ww ww
3. Privacy
4. Stability
m .com .com .com om
h.co of data
5. Reliability h h h h.c
.uo b-b .uo b- b
o b- b
ob-
b
o b-b
w w w.u w.u w.u
ww ww w w ww w w
Dias - Chapter 11 #107

h.c om h.com h.c om h.c om h.co


m
o b-b .uob
- b
.uo b-b o b-b .uo b- b
w w.u w w w.u w
w ww ww ww ww

b h .com b h.com bh.co


m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww

.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww

.c om .com h.c om .com h.c om


ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww

h.c om h .com h.c om h.com .c om


b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww

m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- ob-b ob-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w

h.c om h.c om h.co


m
h.c om .c om
b-b b-b b b-b -bh
.uch11 Summary -
w
o .uo .uob w.u
o .u ob
ww ww w ww
w
ww ww
w

# of Category
Que
bh .com b h.com b h .com b h.com h.com
ob-
stio
.uob
- o b- ob- o b-b
w.uns w w.u w.u w.u
ww 107 Dias - Chapter 11
ww w w ww w w
32 Learning Goal: Describe various types of software and hardware
m Discuss challenges in information
coGoal: com technology .com om m
h.co
23 Learning
b h . b h. b h h.c
-
.u20obLearning Goal: Understand
28 Learning -
uob technology's role in business
Goal: Explain information
uob
- o b-b .uo b- b
w w .how w . w.u w
ww ww information is managed w
w ww ww
75 Level of Learning: Knows basic terms and facts
28 Level of Learning: Understands concepts and principles
m m m m m
- b
1
h.co A can
Rationale:
- b h.coVPNs
virtual private network (VPN)
- b co secure connections or "tunnels",
is a private data network that creates
hof.public - b h.cforoover regular Internet lines
- b h.co
ob. Companies use public ob
lines securely. provide secure ob
sharing resources for dataob
and allow on-demand ob
networking: a
w w.u n authorized user can join
w wthe.unetwork for any desired function,
w w.uat any time, for any length ofwtime,
w.uwhile keeping the corporatewnetwork
w.u sec
w ure. w w w w
1 Rationale: A virtual private network (VPN) is a private data network that creates secure connections or "tunnels", over regular Internet lines
. The idea of the VPN is to give the company the same capabilities at much lower cost by using shared public resources, rather than private
ones..com .com .com .com m
- b h - bh - b h - b h - b h.co
1obRationale: According to Mike McConnell,
b ob Security Agency, if 30.terrorists
former director of the National ob with hacker skills and $10 millio
ob
w.u n attacked the U.S. today, .uocould
wthey w.u
shut down entire communications, w uand transportation systems. ww.u
money supply, electricity
w w w w w w w w w
1 Rationale: Although many people looking to buy a computer think first of the equipment, it is important to find the right software before fin
ding the right hardware. Some programs are easier to use than others. Some are more sophisticated and can perform more functions than oth
ers.
.c om c om
of.software
om
.c in a variety of industries.bShareware
.c om
is copyrighted but disbh.c
om
b -bh to An
1
Rationale:
-ofbh
expert system is a type
b -thathallows people
that is meant to solvebproblems
b b - h and share -
w
o tributed potential customers
.u network and allows people w
o
free charge. Groupware is o
software
.inudifferent areas to work on thewsame to work
.u project at the same time. w.u o
collaboratively .uoonb a
ideas. It runs
w
w w w w w w ww w w
1 Rationale: An expert system is a type of software that is meant to solve problems in a variety of industries. The doctor would input the sym
ptoms and the possible issues would then be viewable.
1 Rationale:m
.coe-commerce. .com
Any business participating in e-commerce
.com
is engaging in e-business,
.co
while a business may engage in m
e-business without necessar
.com
b
ily
- h
doing - b h - b h - b h - b h
ob .uobkeep their antivirus protection ob .uob practice "safe computing" ob
w w.u1 Rationale: Computer users
w wshould w w.uprogram up-to-date and, more
w wimportant, w w.uby not
w w unknown sources and by scanning
downloading files from w file storage devices, such as CDs
w and USB flash drives, before accessing
w any of t
he files on them.
1 Rationale: E-mail is no more private than a postcard. More than one-fourth of U.S. companies scan employee e-mail regularly and legally.
m m m m m
1 h.co E-mail is no more private-bthan
Rationale:
- b h.caopostcard. You do not need-b be.c
toh o target of a criminal investigation
the
- b h.coto have your e-mail review-bh.co
.uobed .uobor in your personal life. More
by someone in your company obone-fourth of U.S. companies.uscan
than
.u obemployee e-mail regularly and
.uo b
legall
w ww y. ww w ww w ww w ww w
1 Rationale: Figure 11.2 states that customer service representatives can solve customers' problems instantly by using companywide databases
to complete tasks from changing addresses to adjusting bills. Information gathered from customer service interactions can further strengthe
n customer relationships.
om
h.c Figure 11.2 states that technology
.c om om
.c cuts the number of employees. .c om .c om
1
o b
Rationale:
s
-band telecommunication o b
equipment
-btohcreateeliminates
"virtual offices" o
with b -bh and
layers of management
employees in various locations. o b -bh Companies use computer
o b -bh
w .u w.u w .u w .u .u w
ww 1 ww
Rationale: Figure 11.2 states that technology is breaking w corporate barriers, allowingwfunctional
wdown w w (even
wgroups
departments or product
factory workers) to share critical information instantly.
1 Rationale: Hackers are people who break into computer systems for illegal purposes, such as transferring funds from someone's bank accou

h om
nt to their own without authorization. Oneco
.csusceptible h
m problem with computer.technology,
. ongoing h com which is likely tobpersist h .coinmthe future is that computbh.com
- b
ers are to hackers. - b - b - -
w .u2obRationale: IBM is workingwon b
.uaosolution ob
w.u with an approach called SMASH:
to computer breakdowns
ob
w.u simple, many and self-healing.
b
uohop
w.The
ww w w w
w made of many small componentswthat have the ability to monitor their
e is to build computers
w
w own performance and solve problems.
w
1 Rationale: In Internet retail, data mining is called shopping cart analysis. Using shopping cart analysis, a manager can see what items people
buy together and as a result make recommendations on product placement.
m m m m .com
2 h.co In managing information, we
Rationale: co to know what is useful andhwhat
h.have .cois not useful. Usefulness is based
h.coon these four characteristic h
.uo b-b o b-b o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww
ob -b ob -b ob -b -b -b
w.u w.u w.u .uob w.u
ob
ww ww ww w ww w w
s: quality, completeness, timeliness and relevance.
1 Rationale: m
.cisothat . soom
Instant messaging (IM) allowscbusiness
.coinmmultiple
professionals to participate m advantage to IM in bu .com
.coThe
conversations at once.
- b h
siness IM is immediate, even
- b h
more than e-mail and there is no
- b h
additional incremental cost, which
- b h
makes overseas communication-bh
w .uobeasier and cheaper. .uob .uob .uob .uob
ww 1 Rationale: Technology
ww www
w workers are reluctant to give information ww
w for increased protection forw
to the government in exchange
ww
fear that the pu
blic will find out about security breaches and lose faith in the company's ability to protect its assets and reputation.
1 Rationale: The importance of information management cannot be overemphasized. For most companies, the proper management of informa
h om
tion is.cthe core of their business.
h .com h .com h .com h.co
m
- b
1obRationale: U.S. companies are o - b -
b allowed to scan employee.ue-mailb - b - b
legally ob and about 25% of them do.uso.obMost e-mail travels over the Internet
ob i
w w.u n unencrypted text. ThewInternet
w.u allows Web surfers to access
w wall sorts of information about w wbusiness and individual Web w
both w.u
sites.
w w w w w
1 Rationale: Usefulness is based on four characteristics: quality, completeness, timeliness and relevance.
1 Rationale: Virtualization is accessibility through technology that allows business to be conducted anywhere at any time. For example, you c
am m om computers. om
b h . can carryo virtual office using such tools asoBlackberries
b h . c or wireless-enabled laptop
b h . c b h . c bh .com
-
1 Rationale: Wi-Fi or wireless fidelity- is the technology used to obtain - Internet connection without ohaving
an - to connect to a phone line orobcab-
w.uoble line. This is available inwPanera
.uobBread and other restaurants. w .uob w .u b w.u
ww 1 Rationale: Wirelessw w w w w w w w
fidelity (Wi-Fi) is the technology used to obtain an Internet connection without having to connect to a phone line or cab
le line.
1 Rationale: Wireless networking refers to the ability of a computer or device to transport signals through the air and without cords.
b h .com b h.com bh.co
m
h.c om h.c om
.uo b- o b- .uo b-
.uo b-b .uo b-b
w w.u w w w
ww w w ww ww ww

.c om h.co
m
h.c om h.c om h.c om
ob -bh b- b b-b b-b b-b
w .u w .uo w.u
o
w.u
o
w .uo
ww ww ww ww ww

.c om .com h.c om .com h.c om


ob -bh ob-
bh
b-b b- b h
b-b
w.u w.u w .uo w .uo w .uo
ww ww ww ww ww

m om om om om
bh.co -bh
.c h.c h.c -bh
.c
.uob
-
.u ob .uo b-b o b-b ob
ww w w w.u w .u
w ww ww ww ww

h.c om h .com h.c om h.c om .c om


b-b b- b b-b b-b b -bh
w .uo w .uo w .uo w.u
o
w .u o
ww ww ww w w ww

m om om om om
bh.co h.c h.c bh.c h.c
.uo b -
.uo b-b .uo b-b ob- .uo b-b
w w w w.u w
ww ww ww ww ww

bh .com h.c om h .com h.co


m
h.com
.uo b- .uo b-b .uo b- b
o b - b
.uo b-b
w w w w.u w
ww ww ww w w ww

m .com om om .com
bh.co bh h.c h.c h
.uo b - o b- o b-b o b-b .uo b- b
w w.u w.u w.u w
ww ww ww ww ww

Vous aimerez peut-être aussi