Exam 22: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An)_________ is a semiprivate network that uses Internet technology to enable more than one company to access the same information or to allow people on different servers to collaborate.

(Multiple Choice)
4.7/5
(33)

Users of Internet2 each pay the same fee for their connection and share bandwidth equally.

(True/False)
4.8/5
(42)

The first step a manager should take to cope with information overload is to:

(Multiple Choice)
4.8/5
(32)

Public data includes electronic traces that people leave when posting to the Internet and sending email.

(True/False)
4.7/5
(36)

Compared to intranets,one advantage of an extranet is that it protects a company's information from hackers.

(True/False)
4.7/5
(47)

Hunter Mixon is an information management specialist for a large corporation.He believes that his company could benefit from data mining techniques,and is looking for ways to implement data mining in his company.One key to Hunter's success will be finding ways to integrate and access data from different divisions and departments of his company.

(True/False)
4.8/5
(34)

During the 1970s business technology employees often dealt directly with customers.

(True/False)
4.8/5
(32)

In the 1970s,business technology was known as:

(Multiple Choice)
4.8/5
(26)

As businesses begin using business intelligence,managers will spend less time finding information and more time using it to make decisions.

(True/False)
4.8/5
(33)

A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.

(True/False)
4.7/5
(38)

One of the most revolutionary impacts computer technology has had on business has been to:

(Multiple Choice)
4.8/5
(32)

When it comes to computers and information technology,government and corporate security officials are now most worried about:

(Multiple Choice)
4.8/5
(27)

Application service providers rented access to the latest software applications to firms via an Internet connection.

(True/False)
5.0/5
(31)

A major impact of information technology has been to:

(Multiple Choice)
4.8/5
(35)

It is illegal for companies to scan e-mails written by their employees at work unless the employees have given permission in advance or the firm has received approval from a federal judge.

(True/False)
4.9/5
(35)

Intranets use a different,less sophisticated,type of technology than the Internet.

(True/False)
4.8/5
(26)

Data mining looks for previously unknown relationships among vast amounts of dat A.

(True/False)
4.8/5
(32)

Timeliness is one of the characteristics of useful management information.

(True/False)
4.9/5
(36)

Public domain software is software that is free for the taking.

(True/False)
4.7/5
(36)

In a ___________ computing system,the tasks are performed by personal computers using information stored in databases controlled by a server.

(Multiple Choice)
4.8/5
(41)
Showing 141 - 160 of 224
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)