Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business110 Questions
Exam 2: Business Ethics and Social Responsibility118 Questions
Exam 3: Economic Challenges Facing Business Today123 Questions
Exam 4: Competing in World Markets123 Questions
Exam 5: Forms of Business Ownership and Organization130 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative102 Questions
Exam 7: Management,leadership,and the Internal Organization139 Questions
Exam 8: Human Resource Management: From Recruitment to Labor Relations124 Questions
Exam 9: Top Performance Through Empowerment,teamwork,and Communication120 Questions
Exam 10: Production and Operations Management127 Questions
Exam 11: Customer-Driven Marketing127 Questions
Exam 12: Product and Distribution Strategies140 Questions
Exam 13: Promotion and Pricing Strategies131 Questions
Exam 14: Using Technology to Manage Information104 Questions
Exam 15: Understanding Accounting and Financial Statements115 Questions
Exam 16: The Financial System137 Questions
Exam 17: Financial Management94 Questions
Exam 18: Trends in E-Commerce45 Questions
Select questions type
Gavin downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause of this was a(n)
(Multiple Choice)
4.9/5
(36)
Kandyse belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.
(Multiple Choice)
4.9/5
(24)
An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.
(True/False)
4.9/5
(30)
Which of the following involves the process of identifying,capturing,evaluating,retrieving,and sharing all of a company's databases,documents,policies,procedures,and previously un-captured expertise and experience of individual workers?
(Multiple Choice)
4.8/5
(33)
Javier is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Javier likely using to create the brochure?
(Multiple Choice)
4.7/5
(35)
The term _____ refers to start-up companies worth $1 billion or more.
(Multiple Choice)
4.8/5
(29)
A virtual private network provides secure communication connections between two points on the Internet.
(True/False)
4.8/5
(25)
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a
(Multiple Choice)
4.8/5
(37)
Salma would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares,territories,and projected sales.In order to achieve maximum impact,Salma should communicate her information to the company's senior executives using a
(Multiple Choice)
4.8/5
(32)
A(n)_____ is an organized method for collecting,storing,and communicating past,present,and projected information on internal operations and external intelligence.
(Multiple Choice)
4.8/5
(44)
_____ is knowledge gained from processing the facts and figures.
(Multiple Choice)
4.8/5
(25)
Which of the following is an example of disruptive innovation?
(Multiple Choice)
4.7/5
(34)
Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called
(Multiple Choice)
4.9/5
(37)
In the context of security and ethical issues affecting information system,theft of equipment is a type of malware.
(True/False)
4.8/5
(41)
Operational support systems are different from transaction processing systems.
(True/False)
4.8/5
(30)
Showing 41 - 60 of 104
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)