Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business40 Questions
Exam 2: Business Ethics and Social Responsibility42 Questions
Exam 3: Economic Challenges Facing Business Today40 Questions
Exam 4: Competing in World Markets42 Questions
Exam 5: Forms of Business Ownership and Organization43 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative40 Questions
Exam 7: Management, Leadership, and the Internal Organization37 Questions
Exam 8: Human Resource Management: From Recruitment to Labor Relations38 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication40 Questions
Exam 10: Production and Operations Management40 Questions
Exam 11: Customer-Driven Marketing41 Questions
Exam 12: Product and Distribution Strategies40 Questions
Exam 13: Promotion and Pricing Strategies40 Questions
Exam 14: Using Technology to Manage Information44 Questions
Exam 15: Understanding Accounting and Financial Statements40 Questions
Exam 16: The Financial System35 Questions
Exam 17: Financial Management40 Questions
Exam 18: Trends in E-Commerce10 Questions
Exam 19: Insurance and Risk Management10 Questions
Exam 20: Personal Financial Planning10 Questions
Exam 21: Developing a Business Plan10 Questions
Exam 22: Careers in Business Today6 Questions
Select questions type
All of the following are examples of e-crimes except:
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
A
The application software that would be best suited for creating a sales presentation is
(Multiple Choice)
4.8/5
(32)
A Trojan horse ______________________________________________.
(Multiple Choice)
4.7/5
(34)
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.
(Multiple Choice)
4.7/5
(35)
_________ can be an outcome of poorly protecting employee or customer data.
(Multiple Choice)
4.9/5
(34)
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
(True/False)
4.8/5
(35)
Which of the following is not one of the components of a computer-based information system?
(Multiple Choice)
4.7/5
(31)
A network of smaller computers that run special software is referred to as ???_____________.
(Multiple Choice)
4.8/5
(30)
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.
(Multiple Choice)
4.9/5
(35)
The heart of any information system is its ______________________________.
(Multiple Choice)
4.9/5
(34)
The fourth industrial revolution has been powered by _____________________________.
(Multiple Choice)
4.9/5
(32)
The first step in off-site data storage is ________________________________.
(Multiple Choice)
4.7/5
(36)
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a
(Multiple Choice)
4.8/5
(26)
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering
(Multiple Choice)
4.7/5
(42)
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.
(Multiple Choice)
5.0/5
(36)
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.
(Multiple Choice)
4.9/5
(29)
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)