Business

List the two core components of information technology and the purpose

QUESTION List the two core components of information technology and the purpose of each. What will be an ideal response?   ANSWER Answer: Information technology is comprised of computers and communications technology. The main purpose of computers is to improve problem solving and productivity. The purpose of communications technology is to enable communicating over distances. […]

Read full post

Date: September 3rd, 2020

Interstate’s chief information officer thinks that improvements to the

QUESTION Interstate’s chief information officer thinks that improvements to the company’s wide area network (WAN) should be a priority for the company. Which of the following, if true, strengthens her position? A) Interstate’s various branches rely greatly on information-sharing with each other. B) Much of the hardware that is used in Interstate’s offices has not […]

Read full post

Date: September 3rd, 2020

List the two types of network connections and compare their advantages

QUESTION List the two types of network connections and compare their advantages and disadvantages. What will be an ideal response?   ANSWER Answer: Networks can be wired or wireless. Wired networks are usually more secure than wireless networks but being connected by a physical wire can be inconvenient. Wireless networks offer more flexibility of location […]

Read full post

Date: September 3rd, 2020

Computers can be classified into several types. What three types are p

QUESTION Computers can be classified into several types. What three types are primarily limited to business use? What will be an ideal response?   ANSWER Answer: Supercomputers, mainframe computers, and workstations are very powerful and expensive types of computers used for business applications. Explanation: Supercomputers, mainframes, and workstations are primarily used for powerful business applications. […]

Read full post

Date: September 3rd, 2020

Cookies seem like a whimsical and harmless name for information techno

QUESTION Cookies seem like a whimsical and harmless name for information technology. What is the purpose of cookies, and what are their potential drawbacks? What will be an ideal response?   ANSWER Answer: Cookies are text files that store personal website data such as login name, password, and site preferences. They let a site remember […]

Read full post

Date: September 3rd, 2020

Raw data often needs to be processed into information to effectively s

QUESTION Raw data often needs to be processed into information to effectively support business decision making. But not all information is created equal. What five qualities are necessary for information to be useful? What will be an ideal response?   ANSWER Answer: To be useful, information must be accurate, complete, relevant, timely, and secure. Explanation: […]

Read full post

Date: September 3rd, 2020

Computers do many cool things, from playing music and supporting socia

QUESTION Computers do many cool things, from playing music and supporting social media to helping children read. From a business decisions perspective, what is the primary purpose of a computer? What will be an ideal response?   ANSWER Answer: For a business, the basic purpose of a computer is to process data into useful information. […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT an example of spyware? A) adware B) Tro

QUESTION Which of the following is NOT an example of spyware? A) adware B) Trojan horse C) browser hijacker D) key logger E) search hijacker   ANSWER Answer: B Explanation: B) Trojan horses are a form of malware, which is malicious software that attacks computer systems. Spyware is software that seeks to harvest confidential information […]

Read full post

Date: September 3rd, 2020

Malware that only targets servers will have the LEAST effect on which

QUESTION Malware that only targets servers will have the LEAST effect on which of the following? A) intranet B) client/server network C) wide area network D) peer-to-peer network E) extranet   ANSWER Answer: D Explanation: D) Malware is malicious software that attacks computer systems. Malware that targets network server computers will not affect peer-to-peer networks, […]

Read full post

Date: September 3rd, 2020

Janet recently received an e-mail from her bank directing her to visit

QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]

Read full post

Date: September 3rd, 2020