Exam 4: Technology Managing Information for Business Success
Exam 1: Politics Governments’ Roles100 Questions
Exam 2: Economics Evolving Systems130 Questions
Exam 3: Social Society, Corporate Responsibility, and Making Ethical Decisions116 Questions
Exam 4: Technology Managing Information for Business Success102 Questions
Exam 5: International The Global Marketplace115 Questions
Exam 6: Entrepreneurship and Small Business102 Questions
Exam 7: Analyzing the Business108 Questions
Exam 8: Forms of Business Ownership107 Questions
Exam 9: Management and Leadership in Today’s Organizations127 Questions
Exam 10: Designing Organizational Structures132 Questions
Exam 11: Motivating Employees102 Questions
Exam 12: Managing Human Resources and Labour Relations111 Questions
Exam 13: Marketing The Customer Focus125 Questions
Exam 14: Creating Marketing Strategies143 Questions
Exam 15: Achieving World-Class Operations Management120 Questions
Exam 16: Accounting for Financial Success117 Questions
Exam 17: Understanding Money and the Canadian Financial System127 Questions
Exam 18: Finance Maximizing the Value127 Questions
Select questions type
When compared to a wired LAN,the wireless LAN is best described by which of the following?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Which type of management support system would be used by only operational managers?
Free
(Essay)
5.0/5
(39)
Correct Answer:
transactions processing systems
What does the statement,"Today most of us are knowledge workers," mean?
Free
(Essay)
4.8/5
(35)
Correct Answer:
Knowledge workers develop or use knowledge.They contribute to and benefit from information that they use in performing,acquiring,searching,analyzing,organizing,storing,programming,producing,distributing,marketing,or selling functions.That is what we computer-age workers do throughout our lives.
An accounts clerk who is able to record a payment of $50 into the company's main computer system as the payment is made is using an online processing system.
(True/False)
4.9/5
(38)
Which of the following is an example of a data security issue?
(Multiple Choice)
4.8/5
(39)
Which of the following systems is software that would be used to record customer orders,payments,and inventory information?
(Multiple Choice)
4.9/5
(46)
How does unsolicited and unwanted e-mail pose a security risk to companies?
(Multiple Choice)
4.8/5
(37)
Kurt Linski has stored information about his customers on his computer.He can use this software to find the phone number of a customer who has a special order,or he can use the software to determine the buying preference of a specific customer.Which of the following does he have on his computer?
(Multiple Choice)
4.9/5
(36)
In a medical clinic,which of the following would contain the medical records of the people who received treatment?
(Multiple Choice)
4.8/5
(42)
Maysteel,which makes components for electric utilities,has created a solution that allows its six plant managers in Wisconsin and Ireland to access customized information about the costs and sales at the other plants.The only people who can access this information are its managers.Which of the following describes this solution?
(Multiple Choice)
4.9/5
(34)
Which of the following information systems handles the daily business operations?
(Multiple Choice)
4.8/5
(40)
Which of the following would have subsystems for order entry,accounts receivable,accounts payable,and general ledger?
(Multiple Choice)
4.8/5
(36)
Which of the following refers to all of the equipment and techniques needed to manage and process information?
(Multiple Choice)
4.8/5
(26)
Which of the following best describes virtual private networks?
(Multiple Choice)
4.9/5
(30)
Which of the following is the term that describes the next generation of ASPs offering customization and expanded capabilities?
(Multiple Choice)
4.8/5
(41)
What is a computer program that copies itself into other software and can spread to other computer systems?
(Multiple Choice)
4.9/5
(25)
With portal technology,users work collaboratively on a virtual supercomputer.
(True/False)
4.8/5
(37)
What do we call copying of software programs by people who haven't paid for them?
(Multiple Choice)
4.7/5
(30)
Showing 1 - 20 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)