Exam 16: Managing Information and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most commonly used encryption system for transmitting data over the Internet is called certificate authority.

Free
(True/False)
5.0/5
(38)
Correct Answer:
Verified

False

Consuela Alvarez is an information system (IS) manager for Metro Hospital, a major medical facility specializing in the care of infants and children. She supervises a total of ten people in processing the hospital’s information needs. She works long hours and always receives an “excellent” rating from upper management. Alvarez has worked for Metro in this capacity for six years and is quite happy with her job. -As an information manager,Alvarez will determine the information needs of members of the organization and collect the appropriate data.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

Which of the following is not included among operations support systems?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

D

A thrift-added network is a private system set up by a third-party firm so that it can conduct a variety of transactions.

(True/False)
4.9/5
(44)

Operations support systems,such as transaction processing systems,are generally used by managers at lower levels of an organization.

(True/False)
4.8/5
(44)

An expert system is an example of an artificial intelligence application that has been commercially successful.

(True/False)
4.8/5
(31)

Ultimately,Metro will have to install a wide area network.

(True/False)
4.9/5
(34)

It's the ability to apply database knowledge to business situations that makes IS professionals particularly valuable to organizations.

(True/False)
4.8/5
(35)

An enterprise resource planning system does all of the following except _____.

(Multiple Choice)
4.8/5
(33)

Artificial intelligence is the science of developing computer systems that can mimic human behavior.

(True/False)
4.9/5
(37)

The practice of installing _____ to keep fires that start in one part of a building from getting into another has a direct application in information technology.

(Multiple Choice)
4.9/5
(23)

By establishing itself as a _____ company,the CD Internet retailer Spun.com avoided carrying $8 million in inventory that it would otherwise have needed to support its sales.

(Multiple Choice)
4.8/5
(33)

Malicious programs constitute a data-security risk associated with electronic communications.

(True/False)
4.8/5
(39)

Working in the _____ department at Newport Timber Corp. ,Barney Crenshaw controls inventory throughout the supply chain,from procurement to distribution.

(Multiple Choice)
4.8/5
(36)

The chief information officer is in charge of collecting appropriate data.

(True/False)
4.8/5
(38)

Password thieves count on people using different passwords for different online accounts.

(True/False)
4.8/5
(38)

The World Wide Web is the same thing as the Internet.

(True/False)
4.9/5
(36)

Databases are electronic collections of related data that can be accessed by various members of an organization.

(True/False)
4.9/5
(40)

As a manager,you can use a(n)_____ system to extract data from a database and compile records that help you make routine decisions.

(Multiple Choice)
4.8/5
(34)

An intranet is a software program that controls access to a company's files.

(True/False)
4.8/5
(42)
Showing 1 - 20 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)