Using Technology To Manage | Test Questions & Answers Ch.11 - Contemporary Business 19e | Practice Test Bank by Louis E. Boone. DOCX document preview.

Using Technology To Manage | Test Questions & Answers Ch.11

Package Title: Chapter 11, Testbank

Course Title: Boone, Contemporary Business, 19th Edition

Chapter Number: 11

Question type: Multiple Choice

1) The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

a) firewall

b) application service provider

c) virtual private network

d) botnet

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

2) A secure connection between two points on the Internet is known as a(n) _____.

a) firewall

b) virtual private network

c) intranet

d) local area network

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

3) A company network that links employees via Internet tools is called a(n) _____.

a) virtual private network

b) intranet

c) local area network

d) information system

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

4) _____ is causing revolutionary growth across businesses and industries.

a) Knowledge management

b) Data

c) Information technology

d) Disruptive innovations

Difficulty: Easy

Learning Objective 1: 11-08: Discuss information technology trends.

Section Reference 1: Information Technology Trends

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

5) Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.

a) malware

b) spyware

c) botnet

d) unicorns

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

6) _____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.

a) Virtual private network

b) Wi-Fi

c) Intranet

d) Local area network

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

7) A computer network that connects machines within a limited area is called a(n) _____.

a) virtual private network

b) intranet

c) local area network

d) information system

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

8) A centralized integrated collection of data resources is known as a(n) _____.

a) intranet

b) local area network

c) database

d) information system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

9) _____ consist of raw facts and figures that may or may not be relevant to business decisions.

a) Knowledge management

b) Decision support system

c) Data

d) Executive support system

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

10) _____ is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets.

a) Knowledge management

b) Decision support system

c) Intranet

\

d) Cloud computing

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

11) A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.

a) application service provider

b) intranet

c) digital workforce

d) expert system

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

12) A(n) _____ is an executive responsible for managing a company's information system and related computer technologies.

a) CIO

b) application service provider

c) digital manager

d) CFO

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

13) A(n) _____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.

a) decision support system

b) expert system

c) executive support system

d) information system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

14) _____ provides access to applications software and databases for users to access via the Web with proper passcodes.

a) Application service provider

b) Virtual private network

c) Intranet

d) Cloud computing

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

15) A(n) _____ is a computer program that imitates human thinking through complicated sets of if-then rules.

a) knowledge management

b) decision support system

c) expert system

d) executive support system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

16) A system that allows top managers to access a company's primary databases is called a(n) _____.

a) knowledge management

b) decision support system

c) expert system

d) executive support system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

17) _____ software secretly gathers user information through the user's Internet connection without the user's knowledge.

a) Firewall

b) Malware

c) Spyware

d) Botnet

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

18) A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.

a) firewall

b) malware

c) spyware

d) botnet

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

19) The _____ of a company is an organized method for collecting, storing, and communicating past, present, and projected data on internal operations and external intelligence.

a) decision support system

b) expert system

b) executive support system

d) information system

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

20) Less expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders, are known as _____.

a) knowledge managers

b) botnets

c) disruptive innovations

d) unicorns

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

21) Wikipedia and other online sources replacing traditional print encyclopedias are examples of _____.

a) knowledge management

b) botnetb

c) disruptive innovations

d) unicorns

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

22) The term _____ refers to startup companies worth $1 billion or more.

a) CIO

b) digital workforce

c) disruptive innovations

d) unicorns

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

23) Uber and Airbnb, worth billions of dollars each, are examples of companies referred to as _____, which use innovative business models to bring about disruption in a particular industry.

a) knowledge managers

b) digital workforce

c) disruptive innovations

d) unicorns

Difficulty: Medium

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

24) Which of the following everyday items has been replaced by the present smart phone?

a) Answering machine

b) Printer

c) Photocopier

d) Weighing balance

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

25) Online retail stores such as Amazon and Blue Nile are slowly replacing brick-and-mortar stores as more people realize that online purchases save time and provide a wider choice of products. In this scenario, Amazon and Blue Nile are examples of _____.

a) a promotional mix

b) disruptive innovations

c) guerilla marketing strategies

d) institutional advertising strategies

Difficulty: Medium

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

26) Which of these refer to less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders?

a) A promotional mix

b) Disruptive innovations

c) Guerilla marketing strategies

d) Institutional advertising

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

27) Which of the following is an example of disruptive innovation?

a) Light bulbs

b) Typewriters

c) Digital cameras

d) Cable-operated excavators

Difficulty: Medium

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

28) Why is Netflix considered a disruptive innovation?

a) It offers a new range of products to consumers.

b) It has more competitors.

c) It targets an entirely new customer base.

d) It has high subscription charges.

Difficulty: Medium

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

29) The term _____ refers to start-up companies worth $1 billion or more.

a) promotional mix

b) unicorn

c) disruptive innovations

d) hardware

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

30) Which of the following is an example of a unicorn, a company that uses innovative business models to bring about disruption in a particular industry?

a) Walmart

b) Uber

c) Netflix

d) Amazon

Difficulty: Medium

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

31) Raw facts and figures are _____.

a) data

b) information

c) a management information system

d) a decision support system

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

32) _____ is knowledge gained from processing facts and figures.

a) Data

b) Information

c) A management information system

d) A decision support system

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

33) A(n) _____ is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.

a) data warehouse

b) information system

c) virtual network

d) firewall

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

34) Which of the following is true of an effective chief information officer (CIO)?

a) Not all large companies relying on information systems need a CIO.

b) He or she is closely connected to the company’s overall business strategies and marketing efforts.

c) The CIO of today is focused on installation and design of software.

d) He or she is an independent asset of a company and does not report to anyone.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

35) Which of these refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze?

a) Marketing mix

b) Big data

c) Promotional mix

d) Database

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

36) Which of the following is true of big data?

a) It is constantly changing.

b) It originates from one primary source.

c) It is always structured.

d) It requires traditional processing applications.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

37) The CEO of TalkTime, a fashion start-up, is looking to establish the company as foremost in the online retail marketplace. To do so, the CEO must use data-driven decision making to manipulate, analyze, evaluate, and format data from multiple sources such as social media, mobile devices, online sales, and customer service feedback. Which of the following would help the CEO carry out the tasks ahead?

a) Business analytics

b) Promotional mix

c) Big data

d) Marketing mix

Difficulty: Medium

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

38) Data mining is the process of _____.

a) searching and analyzing the amount of complex data a business gathers using standard tools and procedures

b) using computer-based technology to evaluate information in a database to identify useful trends

c) collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence

d) promoting an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

39) Jasmine is a television executive whose team conducted demographic research for new programs. Jasmine will be expected to write a detailed ________ report about the impact of this study and the effect of the network’s marketing strategy.

a) data

b) groupware

c) database

d) information

Difficulty: Medium

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

40) The person who directs a company's management information systems and related computer operations is often called the _____.

a) financial advisor

b) chief information officer

c) executive information manager

d) chief executive officer

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

41) A database can best be described as _____.

a) data that has been converted into information

b) data gathered at random from a variety of sources

c) a centralized integrated collection of an organization's data resources

d) a loose collection of ideas

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

42) One of the largest online databases is owned by _____.

a) IBM

b) the U.S. Census Bureau

c) the Federal Trade Commission (FTC)

d) Microsoft

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

43) The purpose of a management information system can best be described by which of the following statements?

a) It assists the human resources department with research on employee benefit costs.

b) It provides management with feedback from sales meetings.

c) It is designed to produce reports for managers and others within the organization.

d) It assists the accounting department with budget information.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

44) An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n) _____.

a) decision support system

b) expert system

c) executive information system

d) database management system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

45) Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the company's ________ system.

a) executive information

b) management information system

c) database management

d) enterprise resource planning

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

46) Federico, the VP of sales, is trying to close a particularly difficult sale. He uses his laptop and a special program to access information within his company's database on pricing. Federico is using an _____.

a) expert system

b) enterprise resource planning system

c) executive support system

d) application service provider

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

47) Penelope, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Penelope uses a(n) _____.

a) enterprise planning resources

b) executive support system

c) expert system

d) decision support system

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

48) A computer program that imitates human thinking is a(n) _____.

a) information interface

b) decision support system

c) enterprise resource planning system

d) expert system

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

49) Antonio works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Antonio is using a(n) _____.

a) expert system

b) enterprise resource planning system

c) decision support system

d) information interface

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

50) An expert system would most likely be used to _____.

a) retrieve sales data

b) determine the status of a customer's order

c) determine the optimal layout of a plant

d) access relevant data from the company's database

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

51) On Homex.com, homebuyers enter information about their preferred home location, price, and features. Using a(n) ________, the website automatically displays real estate properties that match the homebuyer’s criteria.

a) executive information system

b) encryption

c) application service provider

d) expert system

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

52) Which of the following devices is NOT a computer hardware?

a) Monitor

b) Printer

c) MS Word

d) Mouse

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

53) A _____ is a storage device.

a) thumb drive

b) modem

c) CRT monitor

d) scanner

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

54) The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a _____.

a) hand held device

b) personal computer

c) mainframe computer

d) midrange system

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

55) Which of the following is a reason for the increasing popularity of notebook computers?

a) More computing capacity than midrange systems

b) Limited displays

c) Faster processing speeds

d) Higher prices

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

56) Many consumers are now treating _____ as replacements for personal computers.

a) smart phones

b) tablets

c) chromebooks

d) netbooks

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

57) The software which controls the basic workings of the computer system is called a(n) _____.

a) expert

b) executive information system

c) database

d) operating system

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

58) Mario purchases a new game for his computer. He loads the program onto the computer's hard drive. Mario has purchased a(n) _____.

a) output device

b) processing device

c) application software

d) operating system

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

59) A program that performs specific tasks that the user wants to carry out is called _____.

a) financial software

b) the operating system

c) an information management system

d) application software

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

60) Which of the following is application software?

a) Unix

b) Java

c) Microsoft Windows

d) Microsoft Excel

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

61) Javier is sitting at his computer preparing a new sales brochure. What is Javier using to create the brochure?

a) Output device

b) Processing device

c) Application software

d) Operating system

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

62) Electronic spreadsheets _____.

a) are a type of special software

b) can replace managerial judgment in decision making

c) are a form of hardware

d) are very difficult to use

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

63) Sarah is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Sarah is probably using a ________ program.

a) operating

b) software

c) mainframe

d) hardware

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

64) Nicholas is putting together a presentation for senior management analyzing a potential new market. He is using his computer to create charts and graphs that he will then show as slides. Which of the following is Nicholas using?

a) Operating system

b) Hardware program

c) Software program

d) Mainframe program

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

65) Salma would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares, territories, and projected sales. In order to achieve maximum impact, Salma created her information using _____.

a) software

b) hardware

c) a mainframe program

d) an operating system

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

66) Which of these tie geographical regions together using long-distance telephone lines or satellite transmissions?

a) Local area networks

b) Executive information systems

c) Database systems

d) Wide area networks

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

67) All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n) _____.

a) wide area network

b) enterprise resource system

c) expert system

d) local area network

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

68) Juanita is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Juanita’s company has a(n) _____.

a) Internet

b) botnet

c) intranet

d) extranet

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Tehcnology

Standard 2: Bloom’s || Application

69) What is the primary role of the Internet Corporation for Assigned Names and Numbers (ICANN)?

a) To provide data storage and management services to other companies

b) To analyze knowledge management using the Internet

c) To preserve the operational stability of the Internet

d) To enable sharing and exchange of virtual information

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

70) Which of the following statements is true about intranets?

a) Intranets require a Windows operation system.

b) Intranets can be accessed by anyone with an Internet connection.

c) Intranets provide secure connections between two points on the Internet.

d) Intranets allow information sharing within a company network.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

71) Denzel’s company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Denzel’s company has installed a(n) _____.

a) virtual private network

b) wide area network

c) intranet

d) extranet

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

72) William purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, William established a(n) ________ to create company bulletin boards, share documents, and conduct online conferences.

a) extranet

b) intranet

c) botnet

d) Internet

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

73) Which of the following is true of a virtual network?

a) It only consists of links that are physical connections.

b) It reduces the cost of maintaining costly hardware and software.

c) It can integrate computers running all kinds of operating systems.

d) It nurtures innovation and the development of creative ideas.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

74) A program that attaches itself to other programs and changes programs or destroys data is a(n) _____.

a) computer virus

b) purge program

c) inoculation program

d) operational program

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

75) Kandyse belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.

a) cloud program

b) software application

c) Trojan horse

d) network firewall

Difficulty: Medium

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

76) Gavin downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n) _____.

a) malfunctioning computer

b) intranet failure

c) computer virus

d) bad operating system

Difficulty: Medium

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

77) Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called _____.

a) disaster recovery planning

b) information systems management

c) advanced computer security

d) virus protection

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

78) Why is it essential for organizations to keep an off-site data backup in a separate physical or virtual location?

a) Keeping multiple backup locations reduces the time required for the initial backup.

b) A single data backup location is vulnerable to threats from both natural and human-caused disasters.

c) Multiple data backup locations is the most cost-effective method of managing important organizational data.

d) Federal law requires all organizations, large or small, to have more than one data backup location.

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

79) Tammin’s office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Tammin took no chances and implemented a(n) ________, in which she backed up her data in a secure online storage service.

a) enterprise resource planning

b) firewall

c) encryption

d) disaster recovery planning

Difficulty: Medium

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

80) An outside supplier used for providing computer and program support for managing an information system is known as _____.

a) an application service provider

b) an application maintenance provider

c) utility maintenance provider

d) on-demand service provider

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

81) Marius, a software engineer at Frensen Inc. needs to develop a presentation for delivery at his next team meeting. In the context of application software, he must use _____ software to accomplish this.

a) presentation

b) spreadsheet

c) database

d) word processing

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

82) Musetta, a computer science student at Grand University, purchases a new computer for her software programming needs. She must install _____ on her computer to make it work.

a) Linux

b) Adobe InDesign

c) Intuit QuickBooks

d) Quicken

Difficulty: Medium

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

83) Trevor, an information technology manager at Baron Inc. needs intranet in the new building that the company has purchased. Instead of spending money on a wired network, Trevor decides that he will use a wireless intranet service. He needs intranet with around 300-feet radius. Trevor can provide wireless intranet using _____ in the building.

a) botnet

b) Wi-Fi

c) Wi-Max

d) VoiP

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

84) Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer’s browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a _____.

a) worm

b) botnet

c) spyware

d) bug

Difficulty: Medium

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

85) Elena works as a software engineer at Teloxel Ltd., a medium-sized company. While evaluating her company’s information systems infrastructure, she finds that the current systems do not have the ability to process the company’s growing information and data infrastructure. Elena plans to suggest the use of powerful servers that will store applications, software, and databases for all employees to access via the web using either a laptop or a smart phone. Which of the following is Elena most likely to suggest?

a) On-demand computing

b) Distributed computing

c) Grid computing

d) Cloud computing

Difficulty: Medium

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

86) Which of the following is true of enterprise computing?

a) It is an alternative to traditional telecommunication services.

b) It allows networking of a single type of hardware.

c) It disrupts data flow in an organization.

d) It allows an organization to integrate different types of networks.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

87) Which of the following involves the process of identifying, capturing, evaluating, retrieving, and sharing all of a company’s databases, documents, policies, procedures, and previously un-captured expertise and experience of individual workers?

a) Business analytics

b) Data mining

c) Knowledge management

d) Enterprise computing

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

88) All troubleshooting can be performed on remote machines from a single location if a company has a(n) _____.

a) grid computing

b) virtual network

c) disruptive innovation

d) artificial intelligence

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

89) Siri, the personal virtual assistant for the iOS platform, helps users find information using voice recognition. This application not only finds information but also relays information from the user’s phone and sends commands to other applications. Siri is an example of _____.

a) artificial intelligence

b) cloud computing

c) computer hardware

d) virtual network

Difficulty: Medium

Learning Objective 1: 11-08: Discuss information technology trends.

Section Reference 1: Information Technology Trends

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

90) The _____ is a web-connected ecosystem of everyday objects with network connectivity, including TVs, cars, household appliances, and wearable tech devices.

a) disruptive innovation model

b) world wide web

c) Internet of things

d) expert system

Difficulty: Easy

Learning Objective 1: 11-08: Discuss information technology trends.

Section Reference 1: Information Technology Trends

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

Question type: True/False

91) Disruptive innovations refer to less-expensive and simpler versions of existing pro ducts and services that target entirely new customers, many times replacing industry leaders.

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

92) The term big data refers to start-up companies worth $1 billion or more.

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

93) Data alone are of limited value to a company.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

94) A virtual network is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

95) An example of data are sales figures.

Difficulty: Medium

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Application

96) Data is the result of processed information.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

97) Business analytics refers to standard tools and procedures designed to search and analyze the amount of complex data a business gathers.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

98) The software is the heart of a management information system.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

99) Operational support systems are different from transaction processing systems.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Knowledge

100) Decision support systems provide support to people making business decisions.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

101) Executive support systems are computer programs that imitate human thinking through complicated sets of “if-then” rules.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

102) Operational support systems are the information systems that are designed to provide support for effective decision making.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

103) An expert system is a computer program that imitates human thinking.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

104) Credit card applications are often evaluated using executive systems.

Difficulty: Medium

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

105) Computer monitors are examples of computer input devices.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

106) An especially powerful midrange computer is called a mainframe computer.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

107) Mainframe computers have more storage capacity and are faster than personal computers.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

108) As artificial intelligence matures, thanks to a machine learning chip, a new wave of demand is anticipated for AI smart phones.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

109) Interestingly, desktop computers are still sold more than notebook computers.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

110) Application software controls the basic workings of a computer system.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

111) Adobe Acrobat is an example of hardware.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

112) Local area networks allow computers to share the same printers, documents, and information.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

113) A familiar example of wide area networks is long-distance telephone service.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

114) In the context of wireless local networks, there are only a select number of hot spots in public locations today.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

115) An intranet links a company to its suppliers and customers.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

116) A firewall scrambles data and makes it difficult for unauthorized users to view the data.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

117) An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

118) A virtual private network provides secure communication connections between two points on the Internet.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

119) Virtual private networks are more expensive to install than wide area networks.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

120) In the context of security and ethical issues affecting information system, theft of equipment is a type of malware.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

121) A virus can remain dormant for a period of time on a computer.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

122) Viruses don’t need host programs to damage computer systems.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

123) A handful of users click on a link that reads “free unlimited Tetris game” to reveal a blank screen. They later find that information on their hard drive was also erased. The page that falsely advertised a free game is an example of a Trojan horse.

Difficulty: Medium

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Application

124) Cloud-computing services often make off-site backup more complicated.

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

125) One basic form of disaster prevention is routinely backing up software and data.

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

126) On-site data backup involves storing software and data in a separate physical location or online on the Internet.

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

127) Cloud computing allows users to access software and databases via an intranet.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

Question type: Essay

128) Differentiate between data and information.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Analytic

Standard 2: Bloom’s || Comprehension

129) Define databases and describe how they are obtained and their uses.

Difficulty: Easy

Learning Objective 1: 11-03: List components and types of information systems.

Section Reference 1: Components and Types of Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

130) Differentiate between hardware and software. Give examples of both.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

131) Discuss the responsibilities of a computer systems analyst.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

132) Identify and briefly explain the types of computer software.

Difficulty: Easy

Learning Objective 1: 11-04: Discuss computer hardware and software.

Section Reference 1: Computer Hardware and Software

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

133) Describe a wide area network and explain how companies use it.

Difficulty: Easy

Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.

Section Reference 1: Networks, the Internet, and Cloud Computing

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

134) Explain at least two ways in which common cybercrimes occur.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

135) Explain the difference between a virus and a Trojan horse.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

136) Offer examples of ethical concerns surrounding information technology and information systems.

Difficulty: Easy

Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.

Section Reference 1: Security and Ethical Issues Affecting Information Systems

Standard 1: AACSB || Ethics

Standard 2: Bloom’s || Comprehension

137) Identify the five important tasks for off-site data storage.

Difficulty: Easy

Learning Objective 1: 11-07: Explain disaster recovery and backup systems.

Section Reference 1: Disaster Recovery and Backup

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

138) What information technology trends currently exist?.

Difficulty: Easy

Learning Objective 1: 11-08: Discuss information technology trends.

Section Reference 1: Information Technology Trends

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

139) Explain the concept of disruptive innovations using examples.

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

140) Discuss using examples how technology is changing businesses today.

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Knowledge

141) Describe how smart phones have become the most important innovation in the technological revolution impacting businesses today.

Difficulty: Easy

Learning Objective 1: 11-01: Outline the ways technology has forever changed business.

Section Reference 1: Technology Has Forever Changed Business

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

142) Explain the concept of big data.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

143) Describe and illustrate the concept of business analytics.

Difficulty: Easy

Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.

Section Reference 1: Data, Information Systems, and Big Data

Standard 1: AACSB || Technology

Standard 2: Bloom’s || Comprehension

Document Information

Document Type:
DOCX
Chapter Number:
11
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 11 Using Technology To Manage Information 282
Author:
Louis E. Boone

Connected Book

Contemporary Business 19e | Practice Test Bank

By Louis E. Boone

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party