978-0073524597 Test Bank Bonus B Part 4

subject Type Homework Help
subject Pages 9
subject Words 2400
subject Authors James M. McHugh, Susan M. McHugh, William G. Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter Bonus B - Using Technology to Manage Information
184. If you’re traveling through Philadelphia on your way to Acadia National Park in the
state of Maine, you can use your smart phone to make a room reservation and also find a
place to eat, without talking with another person. Your phone is equipped with
____________________ to serve your needs.
A. phone numbers of fast food chains and hotel chains.
B. location-based technology similar to GPS.
C. the ability to call “411” for information, but at an additional cost.
D. ability to phone a friend who might be sitting at his/her computer.
Feedback: Mobile Web technology continues to evolve and offers new and more convenient
services. Smart phones are now equipped with Apps that provide location-based technology
similar to GPS.
185. Moore's Law says that the capacity of computer chips _________ every year or so.
A. increases by 20 percent
B. increases by 50 percent
C. doubles
D. triples
186. __________ includes computers, printers, tablets, and smart phones.
A. Hardware
B. Software
C. Flexware
D. Infomedia
page-pf2
page-pf3
page-pf4
BonusB-64
193. Which of the following would be classified as hardware?
A. PDAs
B. shareware
C. PIMs
D. database program
Feedback: Hardware includes computers, laptops, smart phones, printers, scanners, and
tablets.
194. The reluctance of CIOs to trust their organization's critical data to a firm that does not
have a track record helps explain why:
A. many managers suffer from infoglut.
B. they prefer extranets rather than intranets.
C. Internet2 is unlikely to meet with widespread acceptance.
D. many ASPs failed after the Web boom cooled off.
Feedback: ASP stands for applications service provider. These firms lease specific software
applications over the Internet. Most ASPs failed after the Web boom because CIOs were
reluctant to hand over their organization's critical data and functions to companies that lacked
a track record or had little experience in their specific industries.
195.
page-pf5
Chapter Bonus B - Using Technology to Manage Information
BonusB-65
Lee Ann Beane works in the finance department of a major corporation. When Lee Ann
wants to do some complex financial computations, she can use the personal computer that
sits on her desk. However, the actual data she needs is stored on a server. This suggests
that Lee Ann's company uses a(n):
A. innernet system.
B. mainframe computer system.
C. thin-client network.
D. network computing system.
Feedback: In network computing systems, the tasks are handled by personal computers
(which are called clients), but the information needed to complete the tasks is stored in
databases controlled by a central computer called a server.
196. As wi-fi technology becomes more widespread:
A. thin-client networks will become a thing of the past.
B. mobile workers will have greater access to the Internet and their e-mail.
C. computers will become more reliable as they become more self-aware.
D. computer viruses will be less likely to infect computers.
Feedback: Wi-fi technology provides a standardized approach to wireless connectivity. As
more computers and other types of hardware use this technology, it will be easier for people
away from their desktop to access their e-mail and connect to the Internet.
197.
page-pf6
Chapter Bonus B - Using Technology to Manage Information
According to the late Steve Jobs (Apple) and Bill Gates (Microsoft), in the very near
future, everything that you have saved on your computer will be available to you through
your smart phone, your electronic tablet, or other such device as long as you have
Internet service. The technical name for the ability to store an unlimited amount of data,
accessible in real-time is _________.
A. virtuality reality.
B. data processing.
C. data mining.
D. cloud computing.
Feedback: Cloud computing is the ability to store large amounts of data virtually accessible
through the Internet. It will no longer need to be stored on a jump drive or on the hard drive
of your computer. In fact, computers may become a thing of the past.
198. Companies such as Cisco Systems that produce cloud computing network capabilities
are constantly working to improve ________________. Cisco knows that its customers
approve of the value cloud computing provides, but would like to better manage the risks
of investing in this service.
A. the lack of storage the service provides
B. security, stability, and data control
C. the amount of storage available, and to increase the number of brown-outs
D. the number of computers that can be accessing the same data, at the same time
Feedback: Companies that offer cloud computing products and services understand that
security, stability, and control of data are important to customers.
page-pf7
BonusB-67
200. ________ is another name for freeware software.
A. Groupware
B. Shareware
C. Public domain software
D. Generic software
201. A defining characteristic of shareware is that it is:
page-pf8
BonusB-68
202. Rob Jared has been using a shareware program for several days. He really likes the
program, and wants to keep using it. Rob should:
203. One of the most revolutionary impacts computer technology has had on business has
been to:
A. allow employees of organizations to do much of their work at home and on the road.
B. increase the number of layers of management.
C. replace human creativity with artificial creativity.
D. make it easier for businesses to keep proprietary information safe and secure.
204.
page-pf9
Chapter Bonus B - Using Technology to Manage Information
Employees of a business ____________ when they work at home, using computers
linked to their organization's office.
A. mainstream
B. teleproduce
C. telecommute
D. compucommute
205. A(n) _______ is someone who breaks into a computer system for illegal purposes.
A. network crasher
B. drive jockey
C. arbitrageur
D. hacker
206. A computer ________ is a piece of programming code that is inserted into other
programming to cause an unexpected and often-undesirable event for the victim.
A. virus
B. factoid
C. wasp
D. firecracker
page-pfa
page-pfb

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.