Exam 16: Managing Information Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant190 Questions
Exam 2: Economics: the Framework of Business194 Questions
Exam 3: The World Marketplace: Business Without Borders204 Questions
Exam 4: Business Ethics Social Responsibility: Doing Well by Doing Good201 Questions
Exam 5: Business Communication: Creating Delivering Messages That Matter195 Questions
Exam 6: Business Formation: Choosing the Form That Fits198 Questions
Exam 7: Small Business Entrepreneurship: Economic Rocket Fuel195 Questions
Exam 8: Accounting: Decision Making by the Numbers198 Questions
Exam 9: Finance: Acquiring Using Funds to Maximize Value200 Questions
Exam 10: Securities Markets: Trading Financial Resources196 Questions
Exam 11: Marketing: Building Profitable Customer Connections191 Questions
Exam 12: Product and Promotion: Creating and Communicating Value204 Questions
Exam 13: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price198 Questions
Exam 14: Management, Motivation, and Leadership: Bringing Business to Life198 Questions
Exam 15: HRM: Building a Top Quality Workforce197 Questions
Exam 16: Managing Information Technology: Finding New Ways to Learn and Link200 Questions
Exam 17: Om: Putting It All Together Endnotes198 Questions
Exam 18: Appendix Studentinstructor Review Cards75 Questions
Exam 19: Online Appendix72 Questions
Select questions type
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard for the users' interest in the product or its promotion.
(Multiple Choice)
4.9/5
(30)
Books, computer programs, video games, and movies are examples of _____.
(Multiple Choice)
4.9/5
(37)
A(n) _____ links computer resources using either a wired or wireless connection.
(Multiple Choice)
4.9/5
(26)
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
(True/False)
4.8/5
(35)
Spyware installs itself on a computer without permission and then tracks computer behavior.
(True/False)
4.9/5
(36)
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.
(True/False)
4.7/5
(26)
Describe some of the ways that the Internet and associated technologies have proved challenging.
(Essay)
4.7/5
(40)
Cloud computing encourages collaboration among employees and business partners.
(True/False)
4.7/5
(39)
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of ecommerce known as C2C.
(True/False)
4.8/5
(35)
A(n) _____ gives managers access to large amounts of data and the processing power to convert the data into highquality information quickly and efficiently.
(Multiple Choice)
4.8/5
(33)
Lucy is frustrated with her computer. Many files on the hard drive have been modified or erased, and now it has trouble booting up. Based on this information, it is most likely that her computer has been:
(Multiple Choice)
4.8/5
(34)
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiberoptic cable.
(True/False)
4.9/5
(40)
_____ refers to marketing, buying, selling, and servicing of products over a network (usually the Internet).
(Multiple Choice)
4.9/5
(36)
The online version of TurboTax™ uses a(n) _____ to take a client through the process of filing his or her tax return. By asking a series of questions, the online site leads the client through tax preparation. A person who may not necessarily have the ability to prepare his or her own taxes can rely on the firm's software to complete the task.
(Multiple Choice)
4.7/5
(29)
_____ is one of the threats that new linkages have presented besides providing businesses with new opportunities.
(Multiple Choice)
4.9/5
(31)
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
(True/False)
4.8/5
(33)
Sandra has been working for six months at TUV Technologies. During that time, she has compiled an impressively long list of names, addresses, phone numbers, and products purchased by customers. To access and search through this information quickly and efficiently, she could store it in a(n) _____.
(Multiple Choice)
4.8/5
(33)
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
(True/False)
4.7/5
(34)
It is time for Tonio to use a new password for his work email. According to Microsoft, Tonio needs to come up with a strong password that contains at least 14 characters and contains no personal information.
(True/False)
4.8/5
(36)
A(n) _____ is similar to a virus, except that it is an independent program that can be spread across computer networks without being attached to other files.
(Multiple Choice)
4.7/5
(34)
Showing 161 - 180 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)