Exam 16: Managing Information and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Your online activities can be intercepted by a practice called privacy theft.

(True/False)
4.8/5
(36)

In most large organizations,the senior management team includes a _____ who oversees information and telecommunications systems.

(Multiple Choice)
4.8/5
(39)

eBay uses the Internet to _____.

(Multiple Choice)
4.9/5
(39)

Information managers perform all of the following tasks except:

(Multiple Choice)
4.9/5
(32)

A firm's _____ system consists of the combination of technologies,procedures,and people who collect and distribute the information needed to make decisions and coordinate and control companywide activities.

(Multiple Choice)
4.8/5
(42)

Companies contract for various cloud computing services,including software as a service (SaaS).Which of the following statements is not true about this type of service?

(Multiple Choice)
4.8/5
(38)

Of the following,only ____ data are considered internal data.

(Multiple Choice)
4.8/5
(33)

In reality,_____ owns the World Wide Web.

(Multiple Choice)
4.7/5
(37)

A company's transaction processing system processes both financial and non-financial transactions.Which of the following is a non-financial transaction?

(Multiple Choice)
4.8/5
(31)

More than _____ percent of individuals in the U.S.age 18 and older use the Internet regularly.

(Multiple Choice)
4.9/5
(36)

So called _____ systems are networks that include a number of client machines and a server.

(Multiple Choice)
4.8/5
(38)

A CIM system is a common element in a flexible manufacturing system.

(True/False)
4.8/5
(32)

Using a technique called _____,computer criminals disguise their identities by modifying the addresses of the computers from which they launch their schemes.

(Multiple Choice)
4.8/5
(33)

Consisting of computers connected by telephone lines,wireless technology,or satellite,a(n)_____ network covers a relatively large geographical area.

(Multiple Choice)
4.8/5
(45)

A(n)_____ is the most commonly used encryption system for transmitting data over the Internet.

(Multiple Choice)
4.7/5
(44)

Caesar's uses data mining to extract lots of useful information about its customers.Before it can do this it must first:

(Multiple Choice)
4.8/5
(39)

A(n)_____ system provides senior managers with customized strategic information presented in a convenient format.

(Multiple Choice)
4.8/5
(30)

An extranet is an intranet that's partially available to certain parties outside of an organization.

(True/False)
4.9/5
(46)

In considering what to do about malicious programs,eBay managers will be concerned about all of the following except _____.

(Multiple Choice)
4.9/5
(43)
Showing 141 - 159 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)