Exam 14: Information Technology (IT)for Business
Exam 1: The U.S. Business Environment110 Questions
Exam 2: Understanding Business Ethics and Social Responsibility106 Questions
Exam 3: Entrepreneurship, New Ventures, and Business Ownership124 Questions
Exam 4: Understanding the Global Context of Business106 Questions
Exam 5: Managing the Business106 Questions
Exam 6: Organizing the Business108 Questions
Exam 7: Operations Management and Quality119 Questions
Exam 8: Employee Behavior and Motivation114 Questions
Exam 9: Leadership and Decision Making112 Questions
Exam 10: Human Resource Management and Labor Relations124 Questions
Exam 11: Marketing Processes and Consumer Behavior116 Questions
Exam 12: Developing and Pricing Products110 Questions
Exam 13: Distributing and Promoting Products116 Questions
Exam 14: Information Technology (IT)for Business108 Questions
Exam 15: The Role of Accountants and Accounting Information109 Questions
Exam 16: Understanding Money and the Role of Banking110 Questions
Exam 17: Managing Business Finances118 Questions
Select questions type
Information networks are leading to leaner companies with fewer employees and simpler organizational structures.
(True/False)
4.8/5
(38)
How can e-commerce help businesses with scattered geographical locations better compete?
(Multiple Choice)
4.9/5
(38)
What system allows outsiders limited access to a firm's internal information systems?
(Multiple Choice)
4.7/5
(43)
What is a computer-based system that allows people to communicate simultaneously from different locations via telephone, e-mail, or video?
(Multiple Choice)
4.9/5
(38)
What type of hack floods a network with bogus requests for information and resources, overloading and shutting down the network?
(Multiple Choice)
4.9/5
(39)
How has information technology affected organizational structure in terms of the number of employees and the organizational structure?
(Essay)
4.9/5
(45)
In addition to wasting users' time, spam consumes a network's bandwidth, thereby reducing the amount of data that can be transmitted in a fixed amount of time for useful purposes.
(True/False)
4.8/5
(37)
Trojan horses are malicious programs that replicate themselves like viruses.
(True/False)
5.0/5
(40)
Hypertext transfer protocol (HTTP)is a basic communications protocol used to receive e-mail.
(True/False)
4.8/5
(42)
What system includes data conferencing and videoconferencing?
(Multiple Choice)
4.8/5
(36)
What does a company need to operate so that it has total control over its communications without dependence on other companies?
(Multiple Choice)
4.9/5
(39)
What is the term for a file that attaches itself to a program, then moves from computer to computer within a networked system, with the intention of contaminating files?
(Multiple Choice)
4.8/5
(31)
What can be used to link all computers in an organization over long distances?
(Multiple Choice)
4.8/5
(30)
What does a wireless wide area network use to link computers and electronic devices over long distances?
(Multiple Choice)
4.9/5
(26)
Intellectual property is something produced by a computer that has personal value.
(True/False)
4.9/5
(41)
Describe the role of information systems, the different types of information systems, and how businesses use such systems.
(Essay)
4.7/5
(38)
Showing 21 - 40 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)