Exam 16: Managing Information and Technology
Exam 1: The Foundations of Business141 Questions
Exam 2: Entrepreneurship145 Questions
Exam 3: Selecting a Form of Business Ownership40 Questions
Exam 4: Business Ethics and Social Responsibility147 Questions
Exam 5: Managing for Business Success137 Questions
Exam 6: Recruiting, Motivating, and Keeping Quality Employees155 Questions
Exam 7: Product Design and Development141 Questions
Exam 8: Operations Management in Manufacturing and Service Industries143 Questions
Exam 9: Business in a Global Environment144 Questions
Exam 10: Marketing: Providing Value to Customers197 Questions
Exam 11: Operating in a Digital Marketing and Social Networking82 Questions
Exam 12: The Role of Accounting in Business152 Questions
Exam 13: Managing Financial Resources151 Questions
Exam 14: Teamwork and Communications143 Questions
Exam 15: Personal Finances138 Questions
Exam 16: Managing Information and Technology159 Questions
Exam 17: The Legal and Regulatory Environment of Business143 Questions
Select questions type
Your online activities can be intercepted by a practice called privacy theft.
(True/False)
4.8/5
(36)
In most large organizations,the senior management team includes a _____ who oversees information and telecommunications systems.
(Multiple Choice)
4.8/5
(39)
Information managers perform all of the following tasks except:
(Multiple Choice)
4.9/5
(32)
A firm's _____ system consists of the combination of technologies,procedures,and people who collect and distribute the information needed to make decisions and coordinate and control companywide activities.
(Multiple Choice)
4.8/5
(42)
Companies contract for various cloud computing services,including software as a service (SaaS).Which of the following statements is not true about this type of service?
(Multiple Choice)
4.8/5
(38)
Of the following,only ____ data are considered internal data.
(Multiple Choice)
4.8/5
(33)
A company's transaction processing system processes both financial and non-financial transactions.Which of the following is a non-financial transaction?
(Multiple Choice)
4.8/5
(31)
More than _____ percent of individuals in the U.S.age 18 and older use the Internet regularly.
(Multiple Choice)
4.9/5
(36)
So called _____ systems are networks that include a number of client machines and a server.
(Multiple Choice)
4.8/5
(38)
A CIM system is a common element in a flexible manufacturing system.
(True/False)
4.8/5
(32)
Using a technique called _____,computer criminals disguise their identities by modifying the addresses of the computers from which they launch their schemes.
(Multiple Choice)
4.8/5
(33)
Consisting of computers connected by telephone lines,wireless technology,or satellite,a(n)_____ network covers a relatively large geographical area.
(Multiple Choice)
4.8/5
(45)
A(n)_____ is the most commonly used encryption system for transmitting data over the Internet.
(Multiple Choice)
4.7/5
(44)
Caesar's uses data mining to extract lots of useful information about its customers.Before it can do this it must first:
(Multiple Choice)
4.8/5
(39)
A(n)_____ system provides senior managers with customized strategic information presented in a convenient format.
(Multiple Choice)
4.8/5
(30)
An extranet is an intranet that's partially available to certain parties outside of an organization.
(True/False)
4.9/5
(46)
In considering what to do about malicious programs,eBay managers will be concerned about all of the following except _____.
(Multiple Choice)
4.9/5
(43)
Showing 141 - 159 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)