QUESTION List the two types of network connections and compare their advantages and disadvantages. What will be an ideal response? ANSWER Answer: Networks can be wired or wireless. Wired networks are usually more secure than wireless networks but being connected by a physical wire can be inconvenient. Wireless networks offer more flexibility of location […]
QUESTION Computers can be classified into several types. What three types are primarily limited to business use? What will be an ideal response? ANSWER Answer: Supercomputers, mainframe computers, and workstations are very powerful and expensive types of computers used for business applications. Explanation: Supercomputers, mainframes, and workstations are primarily used for powerful business applications. […]
QUESTION Cookies seem like a whimsical and harmless name for information technology. What is the purpose of cookies, and what are their potential drawbacks? What will be an ideal response? ANSWER Answer: Cookies are text files that store personal website data such as login name, password, and site preferences. They let a site remember […]
QUESTION Raw data often needs to be processed into information to effectively support business decision making. But not all information is created equal. What five qualities are necessary for information to be useful? What will be an ideal response? ANSWER Answer: To be useful, information must be accurate, complete, relevant, timely, and secure. Explanation: […]
QUESTION Computers do many cool things, from playing music and supporting social media to helping children read. From a business decisions perspective, what is the primary purpose of a computer? What will be an ideal response? ANSWER Answer: For a business, the basic purpose of a computer is to process data into useful information. […]
QUESTION How is Wikipedia an example of Web 2.0? What will be an ideal response? ANSWER Answer: Web 2.0 is an effort to make the Web more social, interactive, and collaborative. Wikipedia is a free, online encyclopedia developed through collaboration. Anyone can contribute information to an entry and review or correct information. Explanation: Wikipedia […]
QUESTION Swapping digital copies of movies, software, and music is a fairly common practice. Most people think it’s harmless. How does digital piracy hurt consumers? What will be an ideal response? ANSWER Answer: Companies that produce digital media invest revenues in enhancing products and developing new products. Lost revenues from piracy lead to fewer […]
QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]
QUESTION What type of network enables communication among employees of a business and specially approved nonemployees via leased lines? A) peer-to-peer network (P2P) B) virtual private network (VPN) C) intranet D) extranet E) local area network (LAN) ANSWER Answer: D Explanation: D) An extranet is a private intranet that connects internal personnel and selected […]
QUESTION Which of the following would cloud computing users NOT expect to be protected against? A) malware B) Trojan horses C) cookies D) worms E) crackers ANSWER Answer: C Explanation: C) Cookies are small text files on a user’s computer that store website information such as login name, password, and preferences. A cookie will […]