Exam 16: Managing Information and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Chief technology officers,who report to the chief information officer (CIO),oversee information technology (IT)planning and implementation.

(True/False)
4.8/5
(33)

Companies install firewalls to prevent fires that start in one part of a building from entering another part.

(True/False)
4.7/5
(35)

External data includes accounting data.

(True/False)
4.8/5
(38)

When Metro transmits digital data-numeric data,text,graphics,photos,video,and voice-from one computer to another through a variety of both wired and wireless communication channels,it's taking advantage of what are called data communication networks.

(True/False)
4.8/5
(37)

Its nonvirtual business model allowed the CD Internet retailer Spun.com to avoid carrying $8 million in inventory that it would otherwise have needed to support its sales.

(True/False)
4.8/5
(45)

One day,Alvarez may become the chief technology officer at Metro.

(True/False)
4.9/5
(39)

A(n)_____ is a software program that controls access to a company's intranet.

(Multiple Choice)
4.9/5
(37)

Data mining is the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.

(True/False)
5.0/5
(35)

_____ involves a centralized database in which data from several databases are consolidated and organized so that they can be easily analyzed.

(Multiple Choice)
4.7/5
(38)

A(n)_____ network links computers that are in close proximity-in the same building or office complex.

(Multiple Choice)
4.8/5
(42)

In your position as _____,you oversee IT planning and implementation and report to the CIO (chief information officer).

(Multiple Choice)
4.8/5
(29)

Piracy is a prevalent form of computer crime.

(True/False)
4.9/5
(32)

A WAN (wide area network)allows companies to share information with those outside the organization by linking computers over a relatively large geographical area.

(True/False)
4.9/5
(35)

Which of the following is a disadvantage of cloud computing?

(Multiple Choice)
4.8/5
(35)

_____ software performs a specific task,such as word processing or spreadsheet creation.

(Multiple Choice)
4.9/5
(45)

Many people fear that Internet _____,which can be valuable information to cyber criminals,are vulnerable to theft.

(Multiple Choice)
4.8/5
(36)

Stealing information off the Internet is called piracy.

(True/False)
4.8/5
(40)

Just about everybody is familiar with the amazing success that eBay has enjoyed during the last few years. It’s spawned eBay stores across the country, and executives plan to roll out more creative business practices in the near future. -The type of business practiced by eBay is best characterized as _____.

(Multiple Choice)
4.8/5
(33)

A wide area network links computers that are in close proximity-in the same building or office complex.

(True/False)
4.8/5
(43)

A financial transaction is an economic event.

(True/False)
4.9/5
(36)
Showing 41 - 60 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)