Filters
Question type

Study Flashcards

Which of the following uses software and/or hardware to prevent unwanted access to a computer or computer system?


A) firewall
B) router
C) spam filter
D) utility program

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Viruses can erase or modify data on your hard drive, prevent computer start-up, or find and send personal information stored on your hard drive to unauthorized people. Viruses are often hidden in e-mails, instant messages, or files downloaded from the Internet.

A) True
B) False

Correct Answer

verifed

verified

Explain how companies use expert systems to solve problems.

Correct Answer

verifed

verified

An expert system (ES) provides a structu...

View Answer

Pharming is a scam that seeks to steal identities by routing Internet traffic to fake websites.

A) True
B) False

Correct Answer

verifed

verified

Businesses develop decision support systems (DSS) to give managers access to large quantities of data and the processing power to convert the data into high-quality information.

A) True
B) False

Correct Answer

verifed

verified

What is used by the online version of TurboTax™, which asks a series of questions to lead clients through the process of filing a tax return?


A) expert system
B) B2B system
C) push technology
D) database

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Many countries are enacting laws in order to control spam. What does the Canadian Anti-Spam Legislation require companies to do?


A) install anti-spam software on all computers
B) use e-mail system software that is security protected
C) gain consent from the persons receiving the messages
D) keep a record of all persons receiving the spam messages

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following are the raw facts and figures businesses collect?


A) information
B) push technology
C) data
D) warehousing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet. Only institutions participating in a consortium of dues-paying members have access to Internet2.

A) True
B) False

Correct Answer

verifed

verified

Thomas has been working for the past six months at TUV Technologies, and during that time he has compiled an impressively long list of names, addresses, phone numbers, and products purchased by customers. How should he store this information in order to access and search through it quickly and efficiently?


A) in a database
B) in an expert system
C) in an information browser
D) in an operating system

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.

A) True
B) False

Correct Answer

verifed

verified

A data warehouse is a large, organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.

A) True
B) False

Correct Answer

verifed

verified

TurboTax™ is a software program that takes the customer through a series of tax-related questions. Based on the customer's responses, the system will select the next question. In the end, it provides all the information the customer needs to file a return to Canada Revenue Agency, including the amount of taxes owed or the amount of a refund to expect. TurboTaxTM is an example of an expert system.

A) True
B) False

Correct Answer

verifed

verified

E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.

A) True
B) False

Correct Answer

verifed

verified

Spyware is a type of malware.

A) True
B) False

Correct Answer

verifed

verified

In which of the following markets do customers often do very careful research, comparing multiple vendors and perhaps even soliciting bids?


A) C2C
B) B2B
C) B2C
D) B2G

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Utility programs are supplemental operating system software, such as firewalls, spam blockers, and other security software.

A) True
B) False

Correct Answer

verifed

verified

Intellectual property refers to products that result from creative and intellectual effort, such as books, musical works, inventions, and computer software.

A) True
B) False

Correct Answer

verifed

verified

The fundamental form of system software is the operating system, which controls the way the computer functions at its most basic level.

A) True
B) False

Correct Answer

verifed

verified

Which of the following were businesses reluctant to embrace, citing concerns about security and reliability?


A) cloud computing
B) application software
C) systems software
D) extranets

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 101 - 120 of 163

Related Exams

Show Answer