Library/Business/Introduction to Business/Using Technology to Manage Information

Using Technology to Manage Information

50 questions available

Summary unavailable.

Questions

Question 1

What is the primary goal of the chief information officer (CIO) in managing a company's information resources?

View answer and explanation
Question 2

According to the text, which type of computer is described as being about the size of a refrigerator and capable of simultaneously running many different programs to support hundreds or thousands of users?

View answer and explanation
Question 3

What is the defining characteristic of a Local Area Network (LAN)?

View answer and explanation
Question 4

What is the primary purpose of a firewall in a corporate network environment?

View answer and explanation
Question 5

What is the key difference between batch processing and online (real-time) processing of data?

View answer and explanation
Question 6

What is the function of a Decision Support System (DSS) within a company's management support systems?

View answer and explanation
Question 7

What is knowledge management (KM), and how does it differ from information management?

View answer and explanation
Question 8

Juniper Networks estimated that the cost of cybercrime to businesses would exceed what amount in 2019?

View answer and explanation
Question 9

What is a 'worm' in the context of computer security?

View answer and explanation
Question 10

What is digital forensics?

View answer and explanation
Question 11

What is the primary benefit of a distributed workforce model for companies like Aetna and American Express?

View answer and explanation
Question 12

What is the fundamental concept behind grid or cloud computing, also known as utility computing?

View answer and explanation
Question 13

Which software is used to facilitate collaborative efforts of workgroups, allowing people in different locations to work on one project and supporting online meetings?

View answer and explanation
Question 14

What is the key advantage of a Virtual Private Network (VPN) for a company with widespread offices?

View answer and explanation
Question 15

How does a data warehouse function within a Management Support System (MSS)?

View answer and explanation
Question 16

What is the role of an Executive Information System (EIS)?

View answer and explanation
Question 17

Which technology is a global standard that improves personal connectivity by wirelessly connecting devices like keyboards, mice, and headsets to computers and phones?

View answer and explanation
Question 18

What is data mining?

View answer and explanation
Question 19

According to Forrester Research, what percentage of companies with one billion dollars or more in revenues use data warehouses as a management tool?

View answer and explanation
Question 20

What is the primary function of an Application Service Provider (ASP)?

View answer and explanation
Question 21

What distinguishes a Trojan horse from a computer virus?

View answer and explanation
Question 22

Which information system is designed to provide advice to managers that is similar to what they would receive from a human consultant?

View answer and explanation
Question 23

What is a primary privacy concern related to the use of data warehouses and data mining by companies and governments?

View answer and explanation
Question 24

What are Managed Service Providers (MSP) considered in relation to Application Service Providers (ASP)?

View answer and explanation
Question 25

What was the estimated global market value for managed IT services in 2016?

View answer and explanation
Question 26

In the context of IT security, what is software and media piracy?

View answer and explanation
Question 27

Which company did Union Pacific (UP) railroad turn to for data warehouse technology to streamline its business operations?

View answer and explanation
Question 28

What is the first step in a company's security strategy to prevent costly computer problems?

View answer and explanation
Question 29

According to the text, what is a key difference between cloud/grid computing and outsourcing from ASPs?

View answer and explanation
Question 30

What is an enterprise portal?

View answer and explanation
Question 31

What is the typical indoor and outdoor range of a Wireless LAN (WLAN)?

View answer and explanation
Question 32

How many years did it take for Union Pacific's data warehouse system to pay for itself?

View answer and explanation
Question 33

What is the next goal for supercomputer speed, defined as quadrillions of computations per second?

View answer and explanation
Question 34

What type of information technology combines many databases across a whole company into one central database to support management decision-making?

View answer and explanation
Question 35

According to a CIO article, what was a lamented issue regarding basic security policies in companies?

View answer and explanation
Question 36

In the case of Captiva Software, cofounder Reynolds Bish made a successful bet on what premise?

View answer and explanation
Question 37

What type of software combines word processing, graphics, and page layout capabilities to allow companies to produce sales brochures and newsletters in-house?

View answer and explanation
Question 38

What percentage of Aetna's HR department size was reduced by shifting routine administrative tasks to their intranet?

View answer and explanation
Question 39

What is the primary difference between a Wide Area Network (WAN) and a Local Area Network (LAN)?

View answer and explanation
Question 40

Which type of management support system produces regularly scheduled reports and special reports based on summary data from the TPS?

View answer and explanation
Question 41

What is the primary risk associated with keylogging software?

View answer and explanation
Question 42

What is the main goal of technology management and planning within a company?

View answer and explanation
Question 43

According to the text, a recent survey of IT executives revealed that over what fraction expect a cyberattack in the near future?

View answer and explanation
Question 44

What is the role of a client application in a computer network?

View answer and explanation
Question 45

What is one of the main reasons for the increasing popularity of wireless networks?

View answer and explanation
Question 46

What type of data is collected over a period of time and processed together in a system known as batch processing?

View answer and explanation
Question 47

At Bristol-Meyers Squibb, how much of their time were company scientists spending searching multiple databases before a knowledge management project integrated them?

View answer and explanation
Question 48

What is a common way that outsiders get into company systems, according to the text?

View answer and explanation
Question 49

What kind of security threat does spam pose to a corporation, besides being a nuisance?

View answer and explanation
Question 50

According to the text, a recent estimate suggests that as much as 3.9 million of the original 21 million what are 'lost' on old hard drives and flash drives?

View answer and explanation