Exam 16: Managing Information Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant190 Questions
Exam 2: Economics: the Framework of Business194 Questions
Exam 3: The World Marketplace: Business Without Borders204 Questions
Exam 4: Business Ethics Social Responsibility: Doing Well by Doing Good201 Questions
Exam 5: Business Communication: Creating Delivering Messages That Matter195 Questions
Exam 6: Business Formation: Choosing the Form That Fits198 Questions
Exam 7: Small Business Entrepreneurship: Economic Rocket Fuel195 Questions
Exam 8: Accounting: Decision Making by the Numbers198 Questions
Exam 9: Finance: Acquiring Using Funds to Maximize Value200 Questions
Exam 10: Securities Markets: Trading Financial Resources196 Questions
Exam 11: Marketing: Building Profitable Customer Connections191 Questions
Exam 12: Product and Promotion: Creating and Communicating Value204 Questions
Exam 13: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price198 Questions
Exam 14: Management, Motivation, and Leadership: Bringing Business to Life198 Questions
Exam 15: HRM: Building a Top Quality Workforce197 Questions
Exam 16: Managing Information Technology: Finding New Ways to Learn and Link200 Questions
Exam 17: Om: Putting It All Together Endnotes198 Questions
Exam 18: Appendix Studentinstructor Review Cards75 Questions
Exam 19: Online Appendix72 Questions
Select questions type
According to the characteristics of good information, highquality information should focus on issues that are important to decision makers.
(True/False)
4.8/5
(35)
_____ is best described as an Internet marketing strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.
(Multiple Choice)
4.7/5
(35)
_____ are skilled computer users who try to gain unauthorized access to other people's computers.
(Multiple Choice)
4.9/5
(31)
Hardware includes the various components of a computer system along with communications and network equipment.
(True/False)
4.9/5
(40)
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
(True/False)
4.8/5
(28)
Many Web 2.0 sites rely on _____ to provide most of their content.
(Multiple Choice)
4.8/5
(36)
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
(True/False)
5.0/5
(33)
_____ refers to the physical components used to collect, input, store, process data, and to display and distribute information.
(Multiple Choice)
4.9/5
(36)
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
(True/False)
4.7/5
(33)
One of the disadvantages of an expert system is that it has little flexibility and no common sense.
(True/False)
4.8/5
(38)
_____ is a technology that stores information on a microchip‐such as a unique serial number‐and transmits it to a reader when its within range.
(Multiple Choice)
4.8/5
(41)
The _____, which allows people to enter commands by clicking on icons on a computer screen, has made today's operating systems much simpler and more intuitive.
(Multiple Choice)
4.9/5
(35)
Ted works for Soo Kin Technologies as a repair technician. He assists other repair persons directly serving end users. Many of the repair persons he assists work at remote locations, requiring Ted to travel long distances to train them. He has discovered that many repair problems are fairly simple and can be handled by the employees themselves if these problems are correctly diagnosed and the appropriate instructions and advice are provided. As a result, Ted is working with programmers to build an _____ that asks the employee or repair person a series of questions about his or her problem and then provides appropriate suggestions based on his or her responses.
(Multiple Choice)
4.9/5
(33)
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
(True/False)
4.8/5
(38)
Deleting email messages from an inbox on a regular basis is the most effective way of eliminating the possibility that others will be able to read the messages.
(True/False)
4.7/5
(37)
The U.S. Congress enacted the Controlling the Assault of NonSolicited Pornography and Marketing Act in 2003. This act:
(Multiple Choice)
4.9/5
(39)
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
(True/False)
4.9/5
(38)
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
(True/False)
4.9/5
(31)
Showing 141 - 160 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)