Filters
Question type

In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.

A) True
B) False

Correct Answer

verifed

verified

A(n) _______ is someone who breaks into a computer system for illegal purposes.


A) network crasher
B) drive jockey
C) arbitrageur
D) hacker

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

In the area of electronic communications, the main focus of corporate and government security officials today is the prevention of credit card fraud.

A) True
B) False

Correct Answer

verifed

verified

Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.

A) True
B) False

Correct Answer

verifed

verified

The increasing use of computer networks has made computer security more complicated.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an advantage of telecommuting?


A) Workers are not included in the office loop.
B) People who work at home have less trouble letting go of work and relaxing when the workday is over.
C) Telecommuting increases travel time and costs.
D) Firms may be able to retain workers who would otherwise leave or retire by allowing them to work at home.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Some advantages of cloud computing include flexible capacity and easier access.

A) True
B) False

Correct Answer

verifed

verified

The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.

A) True
B) False

Correct Answer

verifed

verified

____________ is information charged with enough intelligence to make it relevant and useful.


A) Knowledge
B) Data
C) An hypothesis
D) A theory

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 181 - 189 of 189

Related Exams

Show Answer