978-0073524597 Test Bank Bonus B Part 5

subject Type Homework Help
subject Pages 9
subject Words 2874
subject Authors James M. McHugh, Susan M. McHugh, William G. Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter Bonus B - Using Technology to Manage Information
212. Which of the following statements about computer viruses is most accurate?
A. Viruses could be completely eliminated if people would quit sharing "infected"
diskettes.
B. Wild rumors and sloppy reporting have exaggerated the threat computer viruses pose
to typical computer users. Almost all real-world computer viruses turn out to be harmless
practical jokes.
C. The Internet contains built-in safeguards that prevent programs with viruses from
being downloaded.
D. Although antivirus software can help identify and eliminate known viruses, the
software must be updated frequently to remain effective.
Feedback: Antivirus programs exist, but new viruses are being developed constantly. Existing
antivirus programs cannot identify and eradicate these new viruses unless they are updated on
a regular basis.
213. Which of the following issues is least likely to be a concern when a company uses a
network computer system?
A. Longer hours at the office for most workers
B. Concerns about security issues from hackers and computer viruses
C. Concerns about loss of privacy
D. Lost productivity due to glitches and system crashes
Feedback: Use of computers and networks allows many workers to do more of their work at
home (telecommute), thus reducing the amount of time they must spend at the office.
page-pf2
page-pf3
BonusB-74
216. Although Tucker Lentz has used a computer for several years, he has never worried
about computer viruses. However, a computer-savvy friend recently told him that a new
wave of viruses had been reported. Tucker is wondering whether he should pay more
attention to this threat, and if so, what he can do to protect his computer. Which of the
following represents the best advice for Tucker?
A. Trying to prevent viruses is likely to be more costly and troublesome than just dealing
with the virus if your computer becomes infected. Moreover, the chance of actually
getting a virus is very small, and even if you get one, most viruses do very little real
damage. Thus the best course of action is to simply continue to ignore the problem.
B. Although viruses are potentially harmful, there is no effective way to prevent their
spread. The best approach is to back up important files on a regular basis and reformat
the hard drive any time a virus appears.
C. The Internet has automatic safeguards that prevent viruses from being transmitted
when files are downloaded. Thus, the best way to avoid harmful viruses is to use the
Internet to send any files he wants to share rather than swapping easily infected diskettes.
D. There is no absolutely foolproof way to avoid viruses, but one reasonably effective
safeguard is to install antivirus software and use it to scan diskettes and downloaded files,
making sure that the software is updated on a regular basis to remain effective.
Feedback: Although some viruses can be playful, others can erase or corrupt valuable data, or
even cause the infected hard drive to crash. Viruses can be spread both over the Internet and
by using infected diskettes. One way to protect against known viruses is to use antivirus
software. However, since new viruses are always being developed, this software must be
updated regularly to remain effective.
217.
page-pf4
Chapter Bonus B - Using Technology to Manage Information
Regina Williams works for Findabuck Finance Company, but she seldom sees the inside
of Findabuck's offices. Instead, she does most of her work on a computer located in the
spare bedroom of her home. The computer is linked to Findabuck's office, so her work is
distributed as quickly and efficiently as if she were at the office. Regina is one of the
increasing number of workers who:
A. has become an independent contractor.
B. telecommutes.
C. compu-commutes.
D. uses linked-access shareware.
Feedback: Workers telecommute when they work from their home, using computers linked to
their employers' offices.
page-pf5
BonusB-76
218. What is the key difference between an intranet and an extranet? Why might a firm use
a virtual private network instead of an extranet?
219.
page-pf6
Chapter Bonus B - Using Technology to Manage Information
What are the four characteristics of useful information?
page-pf7
page-pf8
BonusB-79
221.
page-pf9
Chapter Bonus B - Using Technology to Manage Information
When Cy first came to work for Qwikbilt, the application of business technology was
called:
A. data processing.
B. knowledge technology.
C. information systems.
D. backroom computing.
Feedback: During the 1970s, the use of business technology was known as data processing,
and its major purpose was to support business by improving the flow of financial information.
222. Cy is excited about the ability of customers to obtain access to information on
Qwikbilt's network so that the company can provide them with better service. This
suggests that Qwikbilt is making use of a(n):
A. shareware arrangement.
B. integrated network.
C. mainframe system.
D. extranet.
Feedback: An extranet is a semiprivate network that lets more than one organization access
the same information or lets people from different organizations collaborate. One of the most
common uses of an extranet is to extend an intranet to outside customers or suppliers.
page-pfa

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.