View the step-by-step solution to:

1. Which of the following BEST describes the benefit of an enterprise resource planning (ERP) system for an organization?

1.

Which of the following BEST describes the benefit of an enterprise resource planning​ (ERP) system for an​ organization?

A.

It creates virtual business models for managers and tests them with different data to see how they respond.

B.

It enables the organization to ship products from different vendors or suppliers as a single order to a customer.

C.

It coordinates internal operations across various departments with the activities of outside suppliers and notifies customers of upcoming deliveries and billings.

D.

It allows companies to manufacture products in large​ volumes, but each item features the unique customer options.

E.

It allows groups of people to communicate simultaneously from various locations via​ e-mail, phone, or​ video, thereby eliminating travel time and providing immediate contact.


4.

A company wants to allow its employees to have access to sensitive​ and/or confidential information on its computer network but it does not want​ customers, suppliers, or other outsiders to be able to view​ and/or download this information. One way to accomplish this is to​ ______.

A.

use hypertext transfer protocol​ (HTTP)

B.

add an externally located component to replace functions previously performed by application servers

C.

establish an intranet

D.

use an encryption system for all data on the network

E.

install​ anti-virus software on all​ employees' computers


5.

​A(n) _______ allows outside users to partially access a​ firm's internal​ network, enabling businesses to securely share part of their information or operations with​suppliers, vendors,​ partners, or customers.

A.

​client-server network

B.

intranet

C.

local area network

D.

extranet

E.

router


6.

Walnut County Community College has a private computer network that can be accessed only by employees. It contains the​ college's policies and​ procedures, the employee​ handbook, internal job​ postings, confidential information about employee​ benefits, and other restricted information. This is an example of​ _______.

A.

an intranet

B.

​Wi-Fi

C.

a decision support system

D.

a wide area network

E.

an extranet


7.

The global communication network that allows millions of computers worldwide to connect and exchange information is known as​ _______.

A.

the Internet

B.

information technology

C.

​e-commerce

D.

the​ "super Wi-Fi" network

E.

the World Wide Web


8.

In​ client-server networks,​ _______ are the computers that provide services shared by​ users, and​ _______ are the computers through which users request information or resources.

A.

​servers; clients

B.

​intranets; extranets

C.

​clients; servers

D.

wide area networks​ (WANs); local area networks​ (LANs)

E.

​extranets; intranets


9.

​_______ networks are used to link computers in a relatively small geographic​ area, such as a single building or a group of buildings.

A.

​Client-server

B.

Local area

C.

Wide area

D.

Personal area

E.

Enterprise private


10.


Data​ _______ refers to the​ collection, storage,​ retrieval, and management of data in an​ organization's electronic files.

A.

mining

B.

warehousing

C.

recovery

D.

assimilation

E.

assessment


11.

Which of the following is used to create precision​ drawings, technical​ illustrations, and​ two- or​ three-dimensional models of products in the design​ stage?

A.

Encryption system

B.

​Computer-aided manufacturing​ (CAM)

C.

​Computer-aided design​ (CAD)

D.

Material resource planning​ (MRP) system

E.

Computer assisted coding


12.

​Raw, unanalyzed facts and figures are known as​ _______.

A.

statistics

B.

information

C.

intelligence

D.

knowledge

E.

data


13.

​_______ enables managers to transform data into information and​ collect, process, and transmit that information for use in decision making.

A.

Data warehousing

B.

An encryption system

C.

An information system​ (IS)

D.

An extranet

E.

Hypertext transfer protocol​ (HTTP)


14.

Which of the following BEST describes the difference between data and​ information?

A.

Data consist solely of​ digits; information consists of words.

B.

Data is less reliable than information because it has not been verified.

C.

Data is intellectual​ property; information is tangible property.

D.

Information is raw facts and​ figures; data is the interpretation of that information.

E.

Data are raw facts or​ figures; information is the interpretation of that data.


15.

Data​ _______ attempts to identify trends and patterns among the pools of data that have been collected by a company.

A.

customization

B.

assimilation

C.

manipulation

D.

mining

E.

warehousing


16.


For which of the following purposes would a company use data​ mining?

A.

To store data in a more secure location

B.

To allow those outside the company to have limited access to its internal information network

C.

To identify​ trends, patterns, and relationships among the data it has amassed

D.

To search incoming​ e-mail and data files for viruses and​ virus-like characteristics

E.

To create virtual business models that can be tested with different data to see how they respond


17.

Creations of the mind that have commercial​ value, such as​ ideas, literary​ works, names,​ symbols, or​ processes, are known as​ _______.

A.

information

B.

data

C.

information privileges

D.

intellectual property

E.

knowledge rights


18.

Using another​ person's private but unsecured wireless network without their permission or knowledge is known as​ _______.

A.

phishing

B.

a Trojan horse

C.

wireless mooching

D.

pharming

E.

identity theft


20.

Esther receives an email that appears to be from her​ bank, advising that it is conducting an account verification process. The email asks Esther to click on a link to update her account​ information, including her​ name, address, account​ number, and Social Security number. This is likely an example of​ _______.

A.

spam

B.

a computer virus

C.

phishing

D.

a denial of service attack

E.

wireless mooching


21.

Software that surreptitiously gathers information about an Internet​ user's browsing​ habits, intercepts the​ user's personal​ data, and relays that information to others is known as​ _______.

A.

spyware

B.

phishing

C.

spam

D.

wireless mooching

E.

a Trojan horse


22.

Kennita applies for a mortgage loan and is turned down. She obtains a copy of her credit report and learns that someone using her​ name, address, and Social Security number has opened numerous credit card accounts and obtained a car loan. Kennita has been the victim of​ _______.

A.

phishing

B.

a denial of service​ (DoS) attack

C.

spam

D.

a computer virus

E.

identity theft


23.

Electronic​ "junk mail," irrelevant or inappropriate messages sent indiscriminately to a large number of​ recipients, is known as​ ______.

A.

hacking

B.

pharming

C.

spyware

D.

phishing

E.

spam


24.

How does a firewall prevent unauthorized access to a computer​ system?

A.

By encoding all intellectual property owned by the organization

B.

By blocking users who send email messages that appear as if they came from a trusted source

C.

By filtering incoming data by applying a security policy and using a router to control where data goes

D.

By searching incoming email and data files for​ "signatures" of known viruses and​ virus-like characteristics, and discarding or quarantining them

E.

By scrambling email messages so that they look like garbled nonsense to anyone who does not possess the code or key

Recently Asked Questions

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question