Upgrade to remove ads Show
Only ₩37,125/year
Terms in this set (25)True or False Hardware consists of programs that tell a computer how to function. False True or False The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information is called data warehousing. False True or False System software tells the computer's hardware how to interact with the software, what resources to use, and how to use them. True True or False Through data mining, a manager can access demographic information on customers, for example, in order to decide which advertising media may be best to use. True Who has access to intranets generally? A) employees A) employees What is a computer-based system that allows people to communicate simultaneously from different locations via telephone, e-mail, or video? A) groupware D) electronic conferencing What feature allows people in remote locations to work simultaneously on one document? A) videoconferencing C) data conferencing What type of network links computers and workstations, usually within one building? A) satellite communication E) local area What feature does a firewall provide? A) Internet access D) privacy protection Which type of communication technology is attractive to businesses because it eliminates travel expenses? A) VSAT satellite communications D) electronic conferencing Who is the person in charge of operating the systems used for gathering, organizing, and distributing information? A) production manager C) information system manager What is the term used for searching, sifting, and reorganizing pools of data to uncover useful information? A) data
warehousing E) data mining Which cybercriminal activity refers to the act of luring Internet users to bogus websites? A) computer virus distribution C) phishing Which term refers to the unauthorized stealing of personal information from a computer system? A) espionage D) identity theft What is "spam"? A) a form of firewall C) junk e-mail What is the name of software and hardware that prevent hackers from accessing a company's internal network? A) partition B) firewall What are keyboards, monitors, and printers examples of? A) control B) hardware Which of the following BEST describes information? A) the useful interpretation of facts and figures A) the useful interpretation of facts and figures Which of the following supports an organization's managers by providing daily reports, schedules, plans, and budgets? A) management application systems C) management information systems What is a management information system? A) a system that supports managers by
providing daily reports, schedules, plans, and budgets that can be used for making decisions A) a system that supports managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions A small parochial school uses handwritten timecards and attendance sheets to calculate biweekly payroll and vacation time. Which statement, if true, would BEST support the idea by managers to convert to computer software to maintain employee records? A) The school has
multiple types of employees, with different work schedules and different contracts, whose hours are calculated by hand. A) The school has multiple types of employees, with different work schedules and different contracts, whose hours are calculated by hand. The increase of technology in the workplace has resulted in more employees working at home and telecommuting. Telecommuting employees rely heavily on e-mail communication to complete work tasks. Which statement, if true, BEST supports those who claim that e-mail communication fosters increased misunderstandings? A) The high volume of e-mail
discourages employees from interacting with coworkers face to face, thus leading to more misunderstandings. A) The high volume of e-mail discourages employees from interacting with coworkers face to face, thus leading to more misunderstandings Which type of IT threat can spread without a computer user needing to open any software? A) worms A) worms Which of the following BEST describes a firewall? A) a software and hardware system that
prevents outsiders from accessing a company's internal network A) a software and hardware system that prevents outsiders from accessing a company's internal network Why might businesses want to analyze data that reveal what consumers do in the marketplace? A) to be able to send them tailor-made advertisements A) to be able to send them tailor-made advertisements Sets with similar termsldxt.x.f30 terms dimentio14253 Chapter 12 - Enterprise Computing63 terms shugo89149PLUS Chapter 12 - Enterprise Computing63 terms Caricia_Heredia Chapter 14 Business30 terms haileyjamess Sets found in the same folderECO 254-150 terms maineallycat Intro to Bus 7-1278 terms megharris44 Business Chapter 10 Part 226 terms hannah_gellepes Ch2335 terms ghost1550 Other sets by this creatorMKT233 Final Exam68 terms kfindlay2 MKT231 Final Exam Review90 terms kfindlay2 MQM220 Final (Chapters 6, 10, 11, 14, 15)121 terms kfindlay2 ACC131 Chapter 10 Multiple Choice21 terms kfindlay2 Verified questions
ENGINEERING The aircraft carrier is moving at a constant speed and launches a jet plane with a mass of 3 Mg in a distance of 75 m along the deck by means of a steam-driven catapult. If the plane leaves the deck with a velocity of 240 km/h relative to the carrier and if the jet thrust is constant at 22 kN during takeoff, compute the constant force P exerted by the catapult on the airplane during the 75-m travel of the launch carriage. Verified answer
ENGINEERING The following mineral analysis was reported for Michigan State University well water (Michigan Department Environmental Quality, 1979). Determine the total, carbonate, and noncarbonate hardness (in $\mathrm{mg} \cdot \mathrm{L}^{-1}$ as $CaCO_3$). (Note: All units are $m g \cdot L^{-1}$ as the ion unless otherwise stated.) $$ \begin{matrix} \text{Mineral} & \text{Concentration} & \text{Mineral} & \text{Concentration}\\ \text{Fluoride} & \text{1.1} & \ {\text{Silica } (SiO_2)} & \text{13.4}\\ \text{Chloride} & \text{4.0} & \text{Bicarbonate} & \text{318.0}\\ \text{Nitrate} & \text{0.0} & \text{Sulfate} & \text{52.0}\\ \text{Sodium} & \text{14.0} & \text{Iron} & \text{0.5}\\ \text{Potassium} & \text{1.6} & \text{Manganese} & \text{0.07}\\ \text{Calcium} & \text{96.8} & \text{Zinc} & \text{0.27}\\ \text{Magnesium} & \text{30.4} & \text{Barium} & \text{0.2}\\ \end{matrix} $$ Verified answer
ENGINEERING A 5-mm-diameter spherical ball at $50^\circ C$ is covered by a 1-mm-thick plastic insulation $(k = 0.13 W/m \cdot K).$ The ball is exposed to a medium at $15^\circ C,$ with a combined convection and radiation heat transfer coefficient of $20 W/m^2 \cdot K.$ Determine if the plastic insulation on the ball will help or hurt heat transfer from the ball. Verified answer
ENGINEERING Given that $E_g = 0.67\text{ eV}$ for germanium, find the wavelength of peak solar response for the material. Do the photons at this wavelength have a lower or higher energy level? Verified answer Other Quizlet setsStats 07: Hypothesis Testing with z Tests11 terms JasonHeardUPLUS Chapter 16 MGT 35275 terms lambrandon96PLUS ch. 1 socio review41 terms kayla_catuiza Ccna 2 7-962 terms aubcpress94 Related questionsQUESTION How do we monitor fluency and what are the general wpm goals? 7 answers QUESTION What program(s) would you use to create and modify images, designs, and photographs? 15 answers QUESTION Which Integrated Maintenance Database System-Central Database (IMDS-CDB) subsystem allows users to track maintenance actions and has both maintenance and supply data? 15 answers QUESTION pineal gland (produces what? to do what?) 7 answers Which term refers to the unauthorized use of personal information from a computer system?Hacking is a term used to describe unauthorized access to systems, networks, and data (hereafter target). Hacking may be perpetrated solely to gain access to a target or to gain and/or maintain such access beyond authorization.
Which of the following is a cybercriminal who gains unauthorized access to a computer or network?A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
What is the term used for searching sifting and reorganizing pools of data to uncover useful information?The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information is called data warehousing.
What is a computer based system that allows people to communicate simultaneously from different locations via telephone e mail or video Group of answer choices?Teleconferencing means meeting through a telecommunications medium. It is a generic term for linking people between two or more locations by electronics. There are at least six types of teleconferencing: audio, audiographic, computer, video, business television (BTV), and distance education.
|