business questions

Help me study for my Business class. I’m stuck and don’t understand.

1. A firewall provides ________.

a.privacy protection

b. the connection of stations in a LAN

C. Protection from electrical surges

D. Internet access

2. A ________ is a “traffic switch” that determines which path on the network to send each message after it is tested against the firm’s security policy.

A. Blackberry

b. spam blocker

c. router

d. firewall

3. Anti-virus software puts viruses on computers.

a. false

b. true

4. For thousands of businesses, the Internet has not replaced the telephone, fax machine or standard mail as the primary communications tools.

a. true

b. false

5. Hackers break into computers, stealing personal information and company secrets, and launching attacks on other computers.

a. true

b. false

6. Hardware are programs that tell the computer how to function.

a. true

b. false

7. Information technology is improving ________.

a. small business

b. all of the above

c. big business

d. start up business

8. Intranets are usually accessible only to employees.

a. false

b. true

9. Keyboards, monitors, and printers are types of ________.

a. hardware

b. control

c. database

d. software

10. Networks and technology are leading to ________.

a. all of the above

b. simpler structures

c. greater customer satisfaction

d. leaner companies with fewer employees

11. Not only is IT improving existing businesses, it is creating entirely new businesses where none existed before.

a. false

b. true

12. Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be ________.

a. any of the above

b. spam

c. Trojan horse

d. an attempt to attach spyware to her computer

13. Spam is junk e-mail sent to a mailing list or a newsgroup (an online discussion group).

a. true

b. false

14. Spyware is a program unknowingly downloaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system.

a. false

b. true

15. Wal-Mart regards its information as a private resource. What is meant by “private resource”?

a. as asset that is planned, developed, and protected

b. as asset with limited applicability

c. an asset that will decrease in value

d. an asset not intended for anyone’s benefit

16. Wal-Mart uses ________ to sift through incoming information.

a. networks

b. the internet

c. all of the above

d. communications technologies

17. Where is Wi-Fi, or wireless fidelity service, most likely to be found?

a. airport terminals

b. hotels

c. coffee shops

d. at any of these “hotspots”

18. _______ is the fastest growing crime in the United States.

a. Phishing and pharming

b. Wireless mooching

c. identity theft

d. Car-jacking


Answering this question is not essay as it seems. It will require you to research or burn your brain power, write your findings down, edit, proofread severally, and submit unsure of the grade you will get. assignment writers are offering to take care of that. Order your assignment now, relax, submit, and enjoy excellent grades. We guarantee you 100% original answers, timely delivery, and some free products.



Posted in Uncategorized