Exam 22: Using Technology to Manage Information
Exam 1: Taking Risks and Making Profits Within the Dynamic Business Environment327 Questions
Exam 2: Understanding Economics and How It Affects Business317 Questions
Exam 3: Doing Business in Global Markets362 Questions
Exam 4: Demanding Ethical and Socially Responsible Behavior276 Questions
Exam 5: How to Form a Business352 Questions
Exam 6: Entrepreneurship and Starting a Small Business317 Questions
Exam 7: Management and Leadership293 Questions
Exam 8: Structuring Organizations for Todays Challenges369 Questions
Exam 9: Production and Operations Management329 Questions
Exam 10: Motivating Employees387 Questions
Exam 11: Human Resource Management: Finding and Keeping the Best Employees444 Questions
Exam 12: Dealing With Union and Employeemanagement Issues320 Questions
Exam 13: Marketing: Helping Buyers Buy255 Questions
Exam 14: Developing and Pricing Goods and Services352 Questions
Exam 15: Distributing Products316 Questions
Exam 16: Using Effective Promotions285 Questions
Exam 17: Understanding Accounting and Financial Information382 Questions
Exam 18: Financial Management313 Questions
Exam 19: Using Securities Markets for Financing and Investing Opportunities424 Questions
Exam 20: Money,financial Institutions,and the Federal Reserve325 Questions
Exam 21 :test Planning Table for Bonus Chapter A256 Questions
Exam 22: Using Technology to Manage Information224 Questions
Exam 24: Managing Risk155 Questions
Exam 25: Managing Personal Finances264 Questions
Select questions type
The quality of management information depends on its accuracy and reliability.
(True/False)
4.9/5
(42)
Computer technology has become so stable and mature in recent years that,except for problems caused by viruses and hackers,major glitches are essentially a thing of the past.
(True/False)
4.9/5
(33)
Y-5 Connections manufactures wireless equipment for laptop computers and PDAs.Current trends suggest that Y-5 should find the market for its products has strong growth potential.
(True/False)
4.7/5
(33)
Employees of a business ____________ when they work at home,using computers linked to their organization's office.
(Multiple Choice)
4.8/5
(37)
One advantage of a network computing system is that it gives employees access to detailed information.
(True/False)
4.7/5
(28)
A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected,and usually undesirable,event for the user of the software.
(True/False)
4.8/5
(24)
A common use of an extranet is to extend an intranet to outside customers.
(True/False)
4.8/5
(26)
A disadvantage of network systems is that they create barriers that limit communication across functional boundaries.
(True/False)
4.8/5
(41)
According to the late Steve Jobs Apple)and Bill Gates Microsoft),in the very near future,everything that you have saved on your computer will be available to you through your smart phone,your electronic tablet,or other such device as long as you have Internet service.The technical name for the ability to store an unlimited amount of data,accessible in real-time is _________.
(Multiple Choice)
4.8/5
(31)
Moore's Law says that the capacity of computer chips _________ every year or so.
(Multiple Choice)
4.8/5
(37)
Computing costs go up with productivity losses as a company upgrades and troubleshoots equipment as well as trains employees to use the system.
(True/False)
4.7/5
(29)
Janelle is shopping for jeans from one of her favorite online retailers.She clicks on a style that interests her.The website quickly presents her with a close-up view of her selection and additional information that will help her make a decision.When she adds the jeans to her "cart," the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots.As the retailer's website learns more about Janelle and her purchase preferences,it is able to push other ideas toward her,and potentially increase the online retailer's units per transaction.The technology that generates this type of intelligence and personalization is called _________.
(Multiple Choice)
4.8/5
(36)
People in marketing want Cy's help because they are convinced that many hidden patterns and unexpected relationships could be found in the mountains of data the company accumulates.They think that discovering these relationships might help them develop new marketing strategies.This suggests that Cy's next project will be concerned with:
(Multiple Choice)
4.9/5
(34)
Business process information includes all transaction data gathered at the point of sale.
(True/False)
4.9/5
(34)
One problem with most extranets is that they use public lines,which makes it possible for hackers to get into the network.
(True/False)
4.9/5
(31)
Which of the following is the best assessment of the impact extranets have had on the way small businesses operate?
(Multiple Choice)
4.9/5
(31)
Larry Kotter has just learned that his company has been reading the e-mail messages he has sent while at work without getting his permission.Harry can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.
(True/False)
4.9/5
(23)
Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.
(True/False)
4.9/5
(30)
Showing 161 - 180 of 224
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)