Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business152 Questions
Exam 2: Business Ethics and Social Responsibility165 Questions
Exam 3: Economic Challenges Facing Contemporary Business194 Questions
Exam 4: Competing in World Markets166 Questions
Exam 5: Forms of Business Ownership and Organization172 Questions
Exam 6: Starting Your Own Business: The Entrepreneurship Alternative108 Questions
Exam 7: Management, Leadership, and the Internal Organization202 Questions
Exam 8: Human Resource Management: From Recruitment to Labour Relations146 Questions
Exam 9: Top Performance through Empowerment, Teamwork, and Communication141 Questions
Exam 10:Production and Operations Management161 Questions
Exam 11: Customer-Driven Marketing154 Questions
Exam 12: Product and Distribution Strategies181 Questions
Exam 13: Promotion and Pricing Strategies156 Questions
Exam 14: Using Technology to Manage Information113 Questions
Exam 15: Understanding Accounting and Financial Statements132 Questions
Exam 16: The Financial System154 Questions
Exam 17: Financial Management94 Questions
Select questions type
What are some ways that businesses can protect themselves from computer crimes?
(Essay)
4.9/5
(35)
Kyle is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts or graphs that he will then show as slides.Which of the following software programs is Kyle most likely using to create his presentation?
(Multiple Choice)
4.8/5
(31)
More than two-thirds of North American households own at least one personal computer.
(True/False)
4.8/5
(36)
Grid computing combines multiple small computers to create a virtual mainframe.
(True/False)
4.8/5
(37)
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
(Multiple Choice)
4.8/5
(32)
Explain the difference between hardware and software.Give examples of both.
(Essay)
4.7/5
(40)
Sales of notebook computers are now exceeding sales of desktop computers.
(True/False)
4.9/5
(30)
Cloud computing allows users to access software and databases via an intranet.
(True/False)
4.9/5
(24)
The purpose of a(n)________ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
(Multiple Choice)
4.9/5
(38)
________ software secretly gathers user information through the user's Internet connection without the user's knowledge.
(Multiple Choice)
4.8/5
(41)
A program that attaches itself to other programs and changes programs or destroys data is a(n)________.
(Multiple Choice)
4.8/5
(36)
Executive support systems allow senior managers to access the firm's primary databases.
(True/False)
4.9/5
(33)
A familiar example of wide area networks is long-distance telephone service.
(True/False)
4.9/5
(34)
A program that performs specific tasks that the user wants to carry out is called ________.
(Multiple Choice)
4.8/5
(32)
Grid computing is too expensive for small- to medium-sized companies.
(True/False)
4.8/5
(30)
As viruses become more complex,the technology to fight them has lagged behind.
(True/False)
4.8/5
(28)
Showing 21 - 40 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)