THE CONNECTION OF STATIONS IN A LAN

  1. A firewall provides __.

a.privacy protection
B. THE CONNECTION OF STATIONS IN A LAN

C. Protection from electrical surges

D. Internet access

  1. A __ is a "traffic switch" that determines which path on the network to send each message after it is tested against the firm's security policy.

A. Blackberry

b. spam blocker

c. router

d. firewall

  1. Anti-virus software puts viruses on computers.

a. false

b. true

  1. For thousands of businesses, the Internet has not replaced the telephone, fax machine or standard mail as the primary communications tools.

a. true

b. false

  1. Hackers break into computers, stealing personal information and company secrets, and launching attacks on other computers.

a. true

b. false

  1. Hardware are programs that tell the computer how to function.

a. true

b. false

  1. Information technology is improving __.

a. small business

b. all of the above

c. big business

d. start up business

  1. Intranets are usually accessible only to employees.

a. false

b. true

  1. Keyboards, monitors, and printers are types of __.

a. hardware

b. control

c. database

d. software

  1. Networks and technology are leading to __.

a. all of the above

b. simpler structures

c. greater customer satisfaction

d. leaner companies with fewer employees

  1. Not only is IT improving existing businesses, it is creating entirely new businesses where none existed before.

a. false

b. true

  1. Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be __.

a. any of the above

b. spam

c. Trojan horse

d. an attempt to attach spyware to her computer

  1. Spam is junk e-mail sent to a mailing list or a newsgroup (an online discussion group).

a. true

b. false

  1. Spyware is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system.

a. false

b. true

  1. Wal-Mart regards its information as a private resource. What is meant by "private resource"?

a. as asset that is planned, developed, and protected

b. as asset with limited applicability

c. an asset that will decrease in value

d. an asset not intended for anyone's benefit

  1. Wal-Mart uses __ to sift through incoming information.

a. networks

b. the internet

c. all of the above

d. communications technologies

  1. Where is Wi-Fi, or wireless fidelity service, most likely to be found?

a. airport terminals

b. hotels

c. coffee shops

d. at any of these "hotspots"

  1. _ is the fastest growing crime in the United States.

a. Phishing and pharming

b. Wireless mooching

c. identity theft

d. Car-jacking