business questions 40

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

1. A firewall provides ________.

a.privacy protection

b. the connection of stations in a LAN

C. Protection from electrical surges

D. Internet access

2. A ________ is a “traffic switch” that determines which path on the network to send each message after it is tested against the firm’s security policy.

A. Blackberry

b. spam blocker

c. router

d. firewall

3. Anti-virus software puts viruses on computers.

a. false

b. true

4. For thousands of businesses, the Internet has not replaced the telephone, fax machine or standard mail as the primary communications tools.

a. true

b. false

5. Hackers break into computers, stealing personal information and company secrets, and launching attacks on other computers.

a. true

b. false

6. Hardware are programs that tell the computer how to function.

a. true

b. false

7. Information technology is improving ________.

a. small business

b. all of the above

c. big business

d. start up business

8. Intranets are usually accessible only to employees.

a. false

b. true

9. Keyboards, monitors, and printers are types of ________.

a. hardware

b. control

c. database

d. software

10. Networks and technology are leading to ________.

a. all of the above

b. simpler structures

c. greater customer satisfaction

d. leaner companies with fewer employees

11. Not only is IT improving existing businesses, it is creating entirely new businesses where none existed before.

a. false

b. true

12. Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be ________.

a. any of the above

b. spam

c. Trojan horse

d. an attempt to attach spyware to her computer

13. Spam is junk e-mail sent to a mailing list or a newsgroup (an online discussion group).

a. true

b. false

14. Spyware is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system.

a. false

b. true

15. Wal-Mart regards its information as a private resource. What is meant by “private resource”?

a. as asset that is planned, developed, and protected

b. as asset with limited applicability

c. an asset that will decrease in value

d. an asset not intended for anyone’s benefit

16. Wal-Mart uses ________ to sift through incoming information.

a. networks

b. the internet

c. all of the above

d. communications technologies

17. Where is Wi-Fi, or wireless fidelity service, most likely to be found?

a. airport terminals

b. hotels

c. coffee shops

d. at any of these “hotspots”

18. _______ is the fastest growing crime in the United States.

a. Phishing and pharming

b. Wireless mooching

c. identity theft

d. Car-jacking

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper