business questions 40

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadlines.

Order a Similar Paper Order a Different Paper

1. A firewall provides ________.

a.privacy protection

b. the connection of stations in a LAN

C. Protection from electrical surges

D. Internet access

2. A ________ is a “traffic switch” that determines which path on the network to send each message after it is tested against the firm’s security policy.

A. Blackberry

b. spam blocker

c. router

d. firewall

3. Anti-virus software puts viruses on computers.

a. false

b. true

4. For thousands of businesses, the Internet has not replaced the telephone, fax machine or standard mail as the primary communications tools.

a. true

b. false

5. Hackers break into computers, stealing personal information and company secrets, and launching attacks on other computers.

a. true

b. false

6. Hardware are programs that tell the computer how to function.

a. true

b. false

7. Information technology is improving ________.

a. small business

b. all of the above

c. big business

d. start up business

8. Intranets are usually accessible only to employees.

a. false

b. true

9. Keyboards, monitors, and printers are types of ________.

a. hardware

b. control

c. database

d. software

10. Networks and technology are leading to ________.

a. all of the above

b. simpler structures

c. greater customer satisfaction

d. leaner companies with fewer employees

11. Not only is IT improving existing businesses, it is creating entirely new businesses where none existed before.

a. false

b. true

12. Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be ________.

a. any of the above

b. spam

c. Trojan horse

d. an attempt to attach spyware to her computer

13. Spam is junk e-mail sent to a mailing list or a newsgroup (an online discussion group).

a. true

b. false

14. Spyware is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system.

a. false

b. true

15. Wal-Mart regards its information as a private resource. What is meant by “private resource”?

a. as asset that is planned, developed, and protected

b. as asset with limited applicability

c. an asset that will decrease in value

d. an asset not intended for anyone’s benefit

16. Wal-Mart uses ________ to sift through incoming information.

a. networks

b. the internet

c. all of the above

d. communications technologies

17. Where is Wi-Fi, or wireless fidelity service, most likely to be found?

a. airport terminals

b. hotels

c. coffee shops

d. at any of these “hotspots”

18. _______ is the fastest growing crime in the United States.

a. Phishing and pharming

b. Wireless mooching

c. identity theft

d. Car-jacking

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper