Management Chapter 2 2 Internal networking shares the resources of all computers with each networked computer

subject Type Homework Help
subject Pages 14
subject Words 3673
subject Authors James McHugh, Susan McHugh, William Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
56. Enterprise portals have the ability to identify users and give them access to specific areas
of an organization's intranet depending on their relationship to the organization.
57. Widebeam is the term used to refer to technologies that give users continuous access to
the Internet and greatly increase the speed at which data flows to and from their Internet
connection.
58. Bandwidth is the term used to describe the rate at which data flows through the Internet.
page-pf2
59. Internet2 runs more than 22,000 times faster than today's public infrastructure.
60. Initially, the very-high-speed Internet2 network service was set up to connect government
supercomputer centers with a select group of universities.
61. Users of Internet2 each pay the same fee for their connection and share bandwidth
equally.
page-pf3
62. The main purpose of an intranet is to allow a company to keep in close contact with its
customers.
63. The fact that electronic data interchange technology is so expensive that only large firms
can afford to use it puts small firms at a severe disadvantage when it comes to sharing
information.
page-pf4
64. The main reason for setting up an enterprise portal is to ensure that only employees of an
organization have access to the information on its intranet.
65. A major reason for the creation of Internet2 was that private businesses wanted to
establish a network that was free from government regulation.
page-pf5
66. Bluprintz, a company that publishes home design software for personal computers, wants
to set up a temporary link with another firm with which it wants to collaborate and share data on
a short-term basis. Bluprintz wants to keep the cost of setting up this connection reasonable, but
is concerned about hackers and wants to make sure its link is secure. The best way for Bluprintz
to achieve its goal is to set up an extranet with dedicated lines.
67. The On-The-Green Golf Company currently has an intranet, and is considering making
use of an extranet. One of the main reasons On-The-Green may want an extranet is to allow a
select group of outside customers to have access to information on its intranet.
page-pf6
68. Information managers at Sezhu Industries want to provide a single, seamless interface
that will make it easier for customers, suppliers, and employees to gain access to the parts of its
intranet that they need. Sezhu could achieve this result by setting up an enterprise portal.
69. Highbrow University just obtained a link to Internet2. Researchers at Highbrow intend to
make very heavy use of their new link for various forms of collaboration, for videoconferencing
and for running complex simulations. Unlike the regular Internet, the more bandwidth Highbrow's
researchers use on Internet2, the more the University will have to pay.
page-pf7
70. Virtual networking is a process that allows software-based networked computers to run
multiple operating systems and programs.
71. Internal networking shares the resources of all computers with each networked computer.
72. Cloud computing is a form of virtualization in which a company's data and applications are
stored onsite and accessed via an external hard drive.
page-pf8
73. There are three types of cloud computing; private clouds, public clouds, and hybrid
clouds.
74. The advantages of cloud computing are security, possible instability, and data control.
75. Some advantages of cloud computing include flexible capacity and easier access.
page-pf9
76. Because cloud computing is often too expensive for small businesses, it is rarely used.
77. Jimmy Bartlett just got started using a storage device called Dropbox. He stores most of
his information with this service. Jimmy is using cloud computing.
78. The use of computers increases the number of layers of management, resulting in taller
organizations.
page-pfa
79. Even high-tech companies that specialize in computer-related products and services often
outsource technology training.
80. One of the most revolutionary effects of computer networks is that they give employees
the ability to do much of their work at home.
81. Telecommuting is popular with workers, but it is costly for businesses.
page-pfb
82. One problem with telecommuting is that it can cause workers to feel like they are isolated
and left out of the office loop.
83. The increasing use of computer networks has made computer security more complicated.
84. The use of antivirus software completely eliminates the risk of downloading infected files.
page-pfc
85. A computer virus is a piece of programming code that is inserted into other programming
code with the intention of causing some unexpected, and usually undesirable, event for the user
of the software.
86. In the area of electronic communications, the main focus of corporate and government
security officials today is the prevention of credit card fraud.
87. Today the primary concern of corporate and government security officials concerning
electronic communication is in the area of cyberterrorism.
page-pfd
88. As the result of the terrorist attacks on September 11, 2001, managers of most major
corporations have become much more willing to give the government extensive access to
information about problems with electronic communication such as viruses and attacks by
hackers.
89. The Critical Infrastructure Protection Board was established after the terrorist attacks of
September 11, 2001, as part of the Office of Homeland Security.
90. It is illegal for companies to scan e-mails written by their employees at work unless the
employees have given permission in advance or the firm has received approval from a federal
judge.
page-pfe
91. Most e-mail messages are automatically encrypted to protect them from being intercepted
and read by hackers.
92. Websites often send
cookies
to a user's computer that are saved on the computer's hard
drive.
93. There are sites online that provide users with easy access to personal information about
other people.
page-pff
94. When spyware is inadvertently downloaded to a user's computer the software tracks the
user's online behavior. Spyware is installed without the user's knowledge and can infect the
computer with a virus.
95. Computer technology has become so stable and mature in recent years that, except for
problems caused by viruses and hackers, major glitches are essentially a thing of the past.
96. The cause of almost all instability in computer systems can be traced to poorly designed
hardware.
page-pf10
97. One advantage of networked computers is that they offer much greater computer security
than the older mainframe systems.
98. The Internet has greatly slowed the spread of computer viruses by making it possible to
share programs and files by downloading them from online sources rather than sharing
diskettes.
page-pf11
99. Studies have shown that all types of workers are likely to become more productive when
they are allowed to telecommute.
page-pf12
100. Barb Daley has all the technological toolsa laptop, a tablet, and a smartphone that she
can take with her wherever she goes. The computer in her study at home has a cable modem that
provides a broadband connection to her company's intranet. If Barb is like most Americans who
have access to all of this modern technology, she will enjoy a much shorter workweek than
workers in less technologically advanced nations.
page-pf13
101. Mick Connors works for the Critical Infrastructure Protection Board. One of the major
challenges Mick is likely to face is to get CIOs at major corporations to provide the type of
information he needs to help his board achieve its mission.
page-pf14
102. Heidi Luking has discovered that several of the sites she has visited recently downloaded
small files to her computer's hard drive even though she did not request them. The files Heidi
discovered are known as crackers.
103. Larry Kotter has just learned that his company has been reading the e-mails he has sent
while at work without getting his permission. Larry can sue the company for invasion of privacy
under the Electronic Communications Privacy Act of 1997.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.