Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant51 Questions
Exam 2: Economics: The Framework for Business51 Questions
Exam 3: The World Marketplace: Business Without Borders50 Questions
Exam 4: Business Ethics and Social Responsibility: Doing Well by Doing Good50 Questions
Exam 5: Business Communication: Creating and Delivering Messages that Matter50 Questions
Exam 6: Business Formation: Choosing the Form that Fits50 Questions
Exam 7: Small Business and Entrepreneurship: Economic Rocket Fuel50 Questions
Exam 8: Accounting: Decision Making by the Numbers50 Questions
Exam 9: Finance: Acquiring and Using Funds to Maximize Value52 Questions
Exam 10: Financial Markets: Allocating Financial Resources50 Questions
Exam 11: Marketing: Building Profitable Customer Connections50 Questions
Exam 12: Product and Promotion: Creating and Communicating Value50 Questions
Exam 13: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price50 Questions
Exam 14: Management, Motivation and Leadership: Bringing Business to Life50 Questions
Exam 15: Human Resources Management: Building a Top Quality Workforce50 Questions
Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link50 Questions
Exam 17: Operations Management: Putting It All Together50 Questions
Select questions type
Data become _____ when they are processed, organized, and presented in a way that makes them useful to a decision maker in a company.
(Multiple Choice)
5.0/5
(31)
A _________ is a request for the database management software to search a database for data that match criteria specified by a user.
(Multiple Choice)
4.8/5
(42)
The benefit that cloud computing provides to individual users is that:
(Multiple Choice)
4.8/5
(33)
A(n)_____ is a decision support system that helps managers make better decisions in an area where they lack sufficient knowledge.
(Multiple Choice)
4.9/5
(32)
Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.
(Multiple Choice)
4.7/5
(32)
_____ is often referred to as the world's largest computer network.
(Multiple Choice)
4.9/5
(29)
_____ is best described as an Internet advertising strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.
(Multiple Choice)
4.8/5
(39)
In the _____ form of e-commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.
(Multiple Choice)
4.8/5
(40)
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
(Multiple Choice)
4.8/5
(27)
Documents stored on the World Wide Web are written and linked together using _____.
(Multiple Choice)
4.9/5
(29)
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?
(Multiple Choice)
5.0/5
(31)
Business intelligence systems are a new class of decision support systems developed over the past two decades.
(True/False)
4.9/5
(35)
In _____ e-commerce, many purchases may be based on impulse.
(Multiple Choice)
4.9/5
(47)
Habib is a writer. He regularly uses Microsoft Word for his work so he can write, edit, and prepare his manuscripts for publication. In this scenario, which of the following computer products is Habib using?
(Multiple Choice)
4.8/5
(29)
Which of the following statements is true of business-to-business (B2B)e-commerce?
(Multiple Choice)
4.8/5
(25)
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
(True/False)
4.8/5
(39)
_________ refers to the programs that provide instructions to a computer so that it can perform a desired task.
(Multiple Choice)
4.9/5
(30)
"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.
(True/False)
4.9/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)