Exam 23: Extension: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The use of knowledge technology should result in a(n):

(Multiple Choice)
4.8/5
(35)

The success of data mining depends on access to data.

(True/False)
4.8/5
(37)

The key distinction between data and information is that data:

(Multiple Choice)
4.9/5
(43)

Which of the following issues is least likely to be a concern when a company uses a network computer system?

(Multiple Choice)
4.9/5
(39)

The use of computers increases the number of layers of management, resulting in taller organizations.

(True/False)
4.8/5
(28)

During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.

(True/False)
4.9/5
(38)

Larry Kotter has just learned that his company has been reading the e-mails he has sent while at work without getting his permission. Larry can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

(True/False)
4.9/5
(27)

Identify and describe the major security issues confronting information managers.

(Essay)
4.9/5
(31)

Data and information are two different names for essentially the same thing.

(True/False)
4.8/5
(35)

In the 1970s business technology was known as data processing.

(True/False)
4.9/5
(32)

When it comes to computers and information technology, government and corporate security officials are now most worried about:

(Multiple Choice)
4.9/5
(33)

Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view of her selection and additional information that will help her make a decision. When she adds the jeans to her cart, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Janelle and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called _________.

(Multiple Choice)
4.8/5
(37)

During the 1980s business technology became known as:

(Multiple Choice)
4.7/5
(36)

The key to improving management decision making is to provide the manager with as much information as possible.

(True/False)
4.9/5
(33)

A basic truth in management is that you can never have too much information.

(True/False)
4.9/5
(29)

The Critical Infrastructure Protection Board was established after the terrorist attacks of September 11, 2001, as part of the Office of Homeland Security.

(True/False)
4.8/5
(33)

Useful information has three defining characteristics: (1) it is easily accessible, (2) it is efficiently organized, and (3) it is simple to manipulate.

(True/False)
4.9/5
(38)

Although Tucker Lentz has used a computer for several years, he has never worried about computer viruses. However, a computer-savvy friend recently told him that a new wave of viruses has been reported. Tucker is wondering whether he should pay more attention to this threat, and if so, what he can do to protect his computer. Which of the following represents the best advice for Tucker?

(Multiple Choice)
4.8/5
(23)

Today the role of the chief information officer is to help the business use technology to communicate better with others while offering better service and lower costs.

(True/False)
4.8/5
(40)

What are the four characteristics of useful information?

(Essay)
4.9/5
(50)
Showing 61 - 80 of 189
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)