Exam 22: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The use of knowledge technology should result in an):

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

C

During the 1980s business technology became known as:

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

C

Gregory Bowman is a manager who wants to be well informed.Like many managers,however,he is often overwhelmed by information overload.Which of the following would probably be the most useful first step for Gregory to take in order to deal with this problem?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

Information technology has changed the staffing and customer relations of businesses.

(True/False)
4.9/5
(32)

Redundancy is one of the four characteristics of useful information.

(True/False)
4.8/5
(34)

One problem with telecommuting is that it can cause workers to feel like they are isolated and left out of the office loop.

(True/False)
4.9/5
(37)

The experiences of the past several decades show that,while improvements in technology frequently enhance the efficiency of basic business operations,such improvements never actually change the fundamental way that businesses operate.

(True/False)
4.8/5
(34)

The Critical Infrastructure Protection Board was established after the terrorist attacks of September 11,2001 as part of the Office of Homeland Security.

(True/False)
5.0/5
(47)

The advantages of electronic data interchange are no longer limited to large companies,because even small firms can exchange and process data such as orders,invoices,and payments using:

(Multiple Choice)
4.8/5
(37)

Moore's Law says that the capacity of computer chips doubles every year or so.

(True/False)
4.7/5
(38)

Jimmy Bartlett just got some computer software free of charge.When he installed the program and ran it the first time,it displayed a copyright notice and a message saying that he could use the software for thirty days with no charge,but should send $40 to the software developer if he continues using the program after the trial period.The type of software Jimmy is using is known as shareware.

(True/False)
4.9/5
(38)

The key difference between an intranet and an extranet is that an intranet:

(Multiple Choice)
4.8/5
(27)

Since 1988,Bigbux National Bank has tried to make use of new technologies to expand the services it offers to its customers.For example,depositors can obtain updated financial information about their accounts and handle certain types of transactions whenever they wish simply by visiting the bank's website and providing a user name and password.The type of technology Bigbux National Bank uses to provide these services is known as:

(Multiple Choice)
4.7/5
(35)

In the late 1980s and early 1990s,businesses began to emphasize finding ways to employ new technologies to improve existing methods of doing business.

(True/False)
4.9/5
(42)

Information is data that has been processed and organized so that it can be used for managerial decision-making.

(True/False)
4.8/5
(35)

Initially,the very-high-speed backbone network service was set up to connect government supercomputer centers with a select group of universities.

(True/False)
4.7/5
(32)

The increasing use of computer networks has made computer security more complicated.

(True/False)
4.9/5
(36)

Which of the following statements about computer viruses is most accurate?

(Multiple Choice)
4.7/5
(33)

A company can use an)__________ to prevent unauthorized outsiders from accessing information on its intranet.

(Multiple Choice)
4.8/5
(43)

There are sites on the Internet that provide web surfers with easy access to personal information about other people.

(True/False)
4.9/5
(38)
Showing 1 - 20 of 224
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)