Exam 22: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Beginning with the late 1980s the goal of information technology was to:

(Multiple Choice)
4.8/5
(41)

The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.

(True/False)
4.9/5
(36)

During the 1980s,the role of business technology changed from supporting business to doing business.

(True/False)
4.7/5
(31)

Major retail firms such as Wal-Mart have used data mining to customize the product offerings for each store.

(True/False)
4.9/5
(36)

Cy's new project to provide a single entry point to his company's network that identifies users and allows them access to the areas of the network they need indicates that he is working on an):

(Multiple Choice)
4.9/5
(30)

Doris Cargile has been given the responsibility to find ways to store and organize the huge amount of data her firm has collected and continues to collect)over the years.Which of the following would Doris be most likely to set up to handle this responsibility?

(Multiple Choice)
4.9/5
(31)

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on:

(Multiple Choice)
4.7/5
(44)

Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.

(True/False)
4.8/5
(36)

Business Intelligence BI)changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.

(True/False)
4.8/5
(41)

___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.

(Multiple Choice)
4.7/5
(29)

The main reason a firm would establish a firewall for its intranet is that it wants to:

(Multiple Choice)
4.9/5
(39)

What are the four characteristics of useful information?

(Essay)
4.8/5
(45)

Many __________,which ran software at data centers and rented software services to customers,went out of business after the Web boom cooled off.

(Multiple Choice)
4.8/5
(43)

Studies have shown that all types of workers are likely to become more productive when they are allowed to telecommute.

(True/False)
4.8/5
(39)

Websites often send "cookies" to a user's computer that are saved on the computer's hard drive.

(True/False)
4.8/5
(37)

An)___________ serves as an entry point to a variety of resources on an organization's information network.

(Multiple Choice)
4.9/5
(29)

The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.

(True/False)
4.9/5
(43)

During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.

(True/False)
4.7/5
(40)

In older computer systems,a central computer,known as an)_________ performed all of the tasks and sent the results to terminals that could not perform the tasks themselves.

(Multiple Choice)
4.9/5
(30)

As the result of the terrorist attacks on September 11,2001,managers of most major corporations have become much more willing to give the government extensive access to information about problems with electronic communication such as viruses and attacks by hackers.

(True/False)
4.8/5
(32)
Showing 181 - 200 of 224
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)