Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business15 Questions
Exam 2: Business Ethics and Social Responsibility10 Questions
Exam 3: Economic Challenges Facing Business Today15 Questions
Exam 4: Competing in World Markets14 Questions
Exam 5: Forms of Business Ownership and Organization14 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative15 Questions
Exam 7: Management, Leadership, and the Internal Organization15 Questions
Exam 8: Human Resource Management: From Recruitment to Labor Relations15 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication14 Questions
Exam 10: Production and Operations Management15 Questions
Exam 11: Customer-Driven Marketing15 Questions
Exam 12: Product and Distribution Strategies15 Questions
Exam 13: Promotion and Pricing Strategies15 Questions
Exam 14: Using Technology to Manage Information16 Questions
Exam 15: Understanding Accounting and Financial Statements15 Questions
Exam 16: The Financial System15 Questions
Exam 17: Financial Management15 Questions
Exam 18: Trends in E-Commerce19 Questions
Select questions type
All of the following are examples of cybercrimes except:
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
C
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
The current standard for wireless networks is called a:
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called
(Multiple Choice)
4.7/5
(35)
An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence is called _______.
(Multiple Choice)
4.9/5
(38)
A disruptive innovation is called an/a _________________________________________.
(Multiple Choice)
4.8/5
(41)
Microsoft Outlook is an example of which one of the following types of applications software?
(Multiple Choice)
4.8/5
(29)
Computer-based information systems consist of the following component(s).
(Multiple Choice)
4.8/5
(29)
Which one of the following statements concerning a database is incorrect?
(Multiple Choice)
4.8/5
(42)
A computer network that is similar to the Internet, but limits access to authorized users is called _________________.
(Multiple Choice)
4.7/5
(30)
Which of the following represents inputs for computer hardware?
(Multiple Choice)
4.8/5
(30)
A centralized integrated collection of data resources is called:
(Multiple Choice)
4.9/5
(33)
Systems that imitate human thinking through complicated sets of "if-then" rules are referred to as:
(Multiple Choice)
4.9/5
(36)
An operational support system that records and processes business transaction data is referred to as a:
(Multiple Choice)
4.9/5
(31)
Using computer-based technology to retrieve and evaluate data in a database for the purpose of identifying trends is called
(Multiple Choice)
4.9/5
(27)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)