Chapter 15 BA VPN is software that securely encrypts data sent

Document Type
Test Prep
Book Title
Effective Management 6th Edition
Authors
Chuck Williams
Course Post-Assessment CH 15
Williams Effective Management 6e
TRUE/FALSE
1. Raw data contain useful information that communicate a clear and readily understandable message to
the person for which the data were gathered.
2. Most expert systems work by using a collection of "if-then" rules to sort through information and
recommend a course of action.
MULTIPLE CHOICE
1. The first company to use new information technology to substantially lower costs or differentiate
products or services often gains:
a.
first-mover advantage
b.
lower profits
c.
less market adaptability
d.
increased synergy
e.
all of these
2. ____ is the process of discovering unknown patterns and relationships in large amounts of data.
a.
Information keystoning
b.
Data mining
c.
Data warehousing
d.
Data outsourcing
e.
Patterning
3. Unsupervised data mining is particularly good at identifying:
a.
association or affinity patterns
b.
sequence patterns
c.
predictive patterns
d.
data clusters
e.
all of these
4. Two critical steps are required to make sure that data can be accessed by authorized users and no one
else. They are:
a.
authentication and authorization
b.
authorization and empowerment
c.
delegation and empowerment
d.
encryption and empowerment
e.
authentication and encryption
5. Although firewalls can protect personal computers and network services connected to the corporate
network, people away from their offices who interact with their company networks via the Internet
face a safety risk. Which of the following technologies has proven to be an inexpensive solution to this
problem?
a.
safe software for logic (SSL) encryption
b.
virtual private networks
c.
local area networks
d.
firewall reassignment
e.
reengineered applets
6. The goal of an executive information system (EIS) is to:
a.
replace the need for intuition in decision making
b.
create a link among authorized data and network users
c.
protect organizational data from hackers
d.
provide accurate, complete, relevant, and timely information to managers
e.
do none of these
7. A(n) ____ is a private company network that allows employees to easily access, share, and publish
information using Internet software.
a.
LAN portal
b.
private company network (PCN)
c.
intranet
d.
electronic data sharing system
e.
information network
8. Why do the large majority of companies now use intranets?
a.
Intranets are inexpensive.
b.
Experts on how to install and use intranets are common since the crash of the dot.coms.
c.
Intranets are not Web-based.
d.
Intranets do not use HTML.
e.
All of these are explanations for the popularity of intranets.
9. Companies that use electronic data interchange, extranets, and the Internet to gain a competitive
advantage have experienced:
a.
decreased costs
b.
lower productivity
c.
worsening customer service
d.
faster authentication
e.
none of these
10. Which of the following statements about knowledge is true?
a.
Data and information are the same as knowledge.
b.
Knowledge resides in information.
c.
Knowledge is the understanding that one gains from information.
d.
Knowledge is easier to acquire than data and information.
e.
All of these statements about knowledge are true.
11. Unlike an executive information system, a decision support system (DSS):
a.
speeds up and simplifies the acquisition of information
b.
does not process data
c.
helps managers understand problems and potential solutions by acquiring and analyzing
information with sophisticated models
d.
can be used to replace all managerial decision making
e.
removes decision-making bottlenecks by creating a problem organization table

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.