One of the most dramatic changes in connectivity and communications in the past few years has been ________
A) Widespread use of mobile devices with wireless internet connectivity
in a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
B) sending and receiving devices
in a communication system, which among the following convert messages into packets that can travel across the communication channel?
A) connection devices
which physical connection is the fastest?
C) fiber-optic cable
which among the following is considered a line of sight communication medium?
wimax stands for _________
C) worldwide interoperability for microwave access
microwave communication uses high frequency ________
A) radio waves
LTE stands for
A) long term evolution
the GPS device in an automobile uses which communication channel?
A service that uses existing phone lines to provide high speed connections is called _______
cellular services use _______ to provide wireless connectivity to the internet.
D) 3G and 4G cellular networks
the capacity of a communication channel is measured in _______
using this type of communication channel, several users can simultaneously use a single connection for high speed data transfer.
every computer on the internet has a unique numeric address called a(n)
C) IP address
_____ is the process of breaking down information sent or transmitted across the internet in small part.
the essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the internet.
the _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes
in a computer network, this node that request and uses resources available from other nodes
this device enables connectivity between two lans or a lan and a larger network .
A) networks gateway
a wireless access point that provide internet access in a public such as a coffee shop, library, and bookstore, or university.
A) Hot spot
A network topology in which the central node s connected to two or more subordinate nodes that, in turn, are conncected to other sub-ordinate nodes.
this type of network strategy uses central servers to coordinate and supple services to other nodes on the networks
organizations use the following to allow supppliers and others limited access to their networks.
all communication between a company’s internal networks and the outside world pass through
remote users can conncet to an organization’s network through this type of secure private connection.
this type of network topology does not use a specific physical layout
people that collect and sell personal data are called ____
C) information re sellers
these programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
C) employee-monitoring software
small data files taht are deposited on a user’s hard disk when they visit a website are called _____.
these are used by advertisers to keep track of your web activity as you move from one site to the next.
D) third-party cookies
Programs used to secretly record an individual’s activities on the internet are called _____.
which type of program would likely be used by investigators to record a potential suspects internet activities?
C) Keystroke logger
this type of computer criminal creates and distributes malicious programs.
Most browsers offer this, which ensures that your browsing activity is not recording on your hard disk.
D) privacy mode
which of the following is not malware?
a program that replicates itself and clogs computers and networks.
free computer games and free screen saver programs are typical carriers of _____
Which among the following is a way to shut down an ISP or website?
A) Denial of services attack
which among the following is a fraudulent or deceptive act designed to trick indiviuals on the internet into spending time or money for little or no return?
B) internet scam
the use of the internet, cell phones, or other devices to send or post conent intended to hurt or embarrass another person.
the most significant concerns for implementation of computer technology involve security and ethics.
according to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
A) digital millennium copyright act
corporations often use this to prevent copyright viloations.
C) Digital rights management (DRM)
this uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
D) dictionary attack
this type of wi-fi hotspot operate close to a legitimate wi-fi hotspot and steals information such as usernames and passwords.
the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
a(n) _______ acts as a security buffer between a corporation’s private network and all external networks.
which of the following is the most widely used wireless network encryption for home wireless networks?
which of the following is not a measure to protect computer security?
D) keeping the same password on all systems consistently.
_____ is concerned with protecting software and data from unauthorized tampering or damage.
D) Data security
this is a legal concept that gives content creators the right to control use and distribution of their work.
this law gives you the right to look at your personal records held by government agencies.
B) freedom of information act
computer criminals that create and spread viruses are punished under this law
D) computer fraud and abuse act
pricing, promoting, selling, and distributing the organization’s goods and services pertains to which of the following functions?
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
who is responsible for operational matters and monitoring day-to-day events?
this level of management is concerned with-range planning and uses information that will help them plan the future growth and direction of the organization.
A) Top management.
this level of management is involved with tactical planning and implementing the the long-term goals within an organization.
B) Middle management
____ system help supervisors by generating databases that act as the foundation for other information systems.
B) transaction processing
which of the following refers to a system that summarizes detailed data from the transaction processing systems in systems in standard reports for middle-level managers?
B) management information system (MIS)
who uses management information system?
C) middle-level managers
which system presents information in a highly summarized form?
D) Executive support system (ESS)
A transaction processing system is also referred to as a ______.
B) data processing system
the ______ activity records the customer requests for products or services.
B) Sales order processing
money collected from or owed by customers is called _______
C) accounts receivable
The ______ keeps records of the number of each kind of part or finished good in the warehouse.
B) inventory control system
What documentation shows the difference between the income and expenses of the company for a specific time period?
A) income statements
this records assets, liabilities, and the equality owned by the owners of an organization.
A) balance sheet
regional managers can compare their regular sales reports with that of the other regional managers by using ______.
B) periodic reports
an example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
this system is a flexible tool for data analysis, since its reports do not have a fixed format.
B) decision support system
in a GDSS, the ______ is generally the decision maker.
this typically consists of transactions from the transaction processing system.
D) internal data
this decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.
C) tactical model
these systems can be organized to retrieve information from databases outside the company, such as business-news services.
D) executive support systems (ESS)
these systems are used in managing documents communicating and scheduling.
A) Office automation systems
project resources can be scheduled, planned and controlled using ______
A) project managers
which system is a type of artificial intelligence that uses a database contain facts and rules to provide assistance to users?
B) Expert system