Question: QUESTION 30 The connection between a VPN client and a VPN server is called ________. hyperlink data highway bridge tunnel QUESTION 31 Use of Social

QUESTION 30

The connection between a VPN client and a VPN server is called ________.

hyperlink

data highway

bridge

tunnel

QUESTION 31

Use of Social Media systems at work have the following risks (choose 3)

Decreased productivity because of time spent on Facebook, Twitter etc during working hous

Sexual harassment liability

Increased productivity though collaboration, knowledge sharing, problem solving and decision making

Leaking or stealing of confidential information

QUESTION 32

Virtualization is the process by which:

a single operating system is shared by multiple users.

One physical computer hosts many different virtual computers within it

many computers are used to control a server

a single server is used to host the operations of a workstation

QUESTION 33

An example of volatile memory is:

The Random Access Memory (RAM) that is used for the cache in your laptop

The solid state storage (SSD) in your laptop

Thumb drives

CD or DVD

QUESTION 34

Disadvantages of using open source software include (select two):

Maintenance and upgrades may be irregular and not supported

Cheap

Expensive

Software may not be stable

QUESTION 35

Which are examples of storage hardware devices (select two)?

thumb drive

optical disk

barcode scanner

central processing unit

QUESTION 36

Choose two facts that are true about Information Technology (IT) and Information Systems (IS). Select two answers:

IT = hardware + software + data

IS = hardware + software + data

IS = IT + procedures + people

IS can be purchased in multiple currencies

QUESTION 37

Which of the following is a characteristic of volatile memory?

Processor heats up during the operation.

Contents are lost when power is off

Processing of data is very slow

Files are stored permanently

Has to be cleaned annually

QUESTION 38

Which of the following would be the most disruptive to an organization when implementing an information system?

creating new databases

installing new software

changing reporting relationships and tasks for team members

installing new hardware components

QUESTION 39

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes (select two)?

a used car dealership in Dallas

a food vendor at a county fair

an airline that uses most of the gates at Dallas Love Field

a firm that makes the only drug for a disease

a convenience store that sells retail products

QUESTION 40

The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use

incremental

programmatic

elastic

portable

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!