Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.

(True/False)
4.8/5
(35)

_____ is best described as an Internet marketing strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.

(Multiple Choice)
4.7/5
(35)

_____ are skilled computer users who try to gain unauthorized access to other people's computers.

(Multiple Choice)
4.9/5
(31)

Spam is a type of malware.

(True/False)
4.7/5
(27)

Hardware includes the various components of a computer system along with communications and network equipment.

(True/False)
4.9/5
(40)

Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.

(True/False)
4.8/5
(28)

Many Web 2.0 sites rely on _____ to provide most of their content.

(Multiple Choice)
4.8/5
(36)

An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.

(True/False)
5.0/5
(33)

_____ refers to the physical components used to collect, input, store, process data, and to display and distribute information.

(Multiple Choice)
4.9/5
(36)

Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.

(True/False)
4.7/5
(33)

What are the benefits and drawbacks of cloud computing?

(Essay)
4.7/5
(38)

One of the disadvantages of an expert system is that it has little flexibility and no common sense.​

(True/False)
4.8/5
(38)

_____ is a technology that stores information on a microchip‐such as a unique serial number‐and transmits it to a reader when its within range.

(Multiple Choice)
4.8/5
(41)

The _____, which allows people to enter commands by clicking on icons on a computer screen, has made today's operating systems much simpler and more intuitive.

(Multiple Choice)
4.9/5
(35)

Ted works for Soo Kin Technologies as a repair technician. He assists other repair persons directly serving end users. Many of the repair persons he assists work at remote locations, requiring Ted to travel long distances to train them. He has discovered that many repair problems are fairly simple and can be handled by the employees themselves if these problems are correctly diagnosed and the appropriate instructions and advice are provided. As a result, Ted is working with programmers to build an _____ that asks the employee or repair person a series of questions about his or her problem and then provides appropriate suggestions based on his or her responses.

(Multiple Choice)
4.9/5
(33)

Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.

(True/False)
4.8/5
(38)

Deleting email messages from an inbox on a regular basis is the most effective way of eliminating the possibility that others will be able to read the messages.

(True/False)
4.7/5
(37)

The U.S. Congress enacted the Controlling the Assault of Non­Solicited Pornography and Marketing Act in 2003. This act:

(Multiple Choice)
4.9/5
(39)

Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.

(True/False)
4.9/5
(38)

The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.

(True/False)
4.9/5
(31)
Showing 141 - 160 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)