QUESTION List the two core components of information technology and the purpose of each. What will be an ideal response? ANSWER Answer: Information technology is comprised of computers and communications technology. The main purpose of computers is to improve problem solving and productivity. The purpose of communications technology is to enable communicating over distances. […]
QUESTION Interstate’s chief information officer thinks that improvements to the company’s wide area network (WAN) should be a priority for the company. Which of the following, if true, strengthens her position? A) Interstate’s various branches rely greatly on information-sharing with each other. B) Much of the hardware that is used in Interstate’s offices has not […]
QUESTION List the two types of network connections and compare their advantages and disadvantages. What will be an ideal response? ANSWER Answer: Networks can be wired or wireless. Wired networks are usually more secure than wireless networks but being connected by a physical wire can be inconvenient. Wireless networks offer more flexibility of location […]
QUESTION Computers can be classified into several types. What three types are primarily limited to business use? What will be an ideal response? ANSWER Answer: Supercomputers, mainframe computers, and workstations are very powerful and expensive types of computers used for business applications. Explanation: Supercomputers, mainframes, and workstations are primarily used for powerful business applications. […]
QUESTION Cookies seem like a whimsical and harmless name for information technology. What is the purpose of cookies, and what are their potential drawbacks? What will be an ideal response? ANSWER Answer: Cookies are text files that store personal website data such as login name, password, and site preferences. They let a site remember […]
QUESTION Raw data often needs to be processed into information to effectively support business decision making. But not all information is created equal. What five qualities are necessary for information to be useful? What will be an ideal response? ANSWER Answer: To be useful, information must be accurate, complete, relevant, timely, and secure. Explanation: […]
QUESTION Computers do many cool things, from playing music and supporting social media to helping children read. From a business decisions perspective, what is the primary purpose of a computer? What will be an ideal response? ANSWER Answer: For a business, the basic purpose of a computer is to process data into useful information. […]
QUESTION Which of the following is NOT an example of spyware? A) adware B) Trojan horse C) browser hijacker D) key logger E) search hijacker ANSWER Answer: B Explanation: B) Trojan horses are a form of malware, which is malicious software that attacks computer systems. Spyware is software that seeks to harvest confidential information […]
QUESTION Malware that only targets servers will have the LEAST effect on which of the following? A) intranet B) client/server network C) wide area network D) peer-to-peer network E) extranet ANSWER Answer: D Explanation: D) Malware is malicious software that attacks computer systems. Malware that targets network server computers will not affect peer-to-peer networks, […]
QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]