Exam 22: Appendix: Using Technology to Manage Information
Exam 1: Taking Risks and Making Profits Within the Dynamic Business Environment315 Questions
Exam 2: Understanding Economics and How It Affects Business305 Questions
Exam 3: Doing Business in Global Markets346 Questions
Exam 4: Demanding Ethical and Socially Responsible Behavior257 Questions
Exam 5: How to Form a Business342 Questions
Exam 6: Entrepreneurship and Starting a Small Business303 Questions
Exam 7: Management and Leadership281 Questions
Exam 8: Structuring Organizations for Todays Challenges364 Questions
Exam 9: Production and Operations Management321 Questions
Exam 10: Motivating Employees357 Questions
Exam 11: Human Resource Management: Finding and Keeping the Best Employees423 Questions
Exam 12: Dealing With Employeemanagement Issues297 Questions
Exam 13: Marketing: Helping Buyers Buy250 Questions
Exam 14: Developing and Pricing Goods and Services356 Questions
Exam 15: Distributing Products314 Questions
Exam 16: Using Effective Promotions262 Questions
Exam 17: Understanding Accounting and Financial Information362 Questions
Exam 18: Financial Management297 Questions
Exam 19: Using Securities Markets for Financing and Investing Opportunities397 Questions
Exam 20: Money, Financial Institutions, and the Federal Reserve306 Questions
Exam 21: Appendix: Working Within the Legal Environment242 Questions
Exam 22: Appendix: Using Technology to Manage Information192 Questions
Exam 23: Appendix: Managing Risk128 Questions
Exam 24: Appendix: Managing Personal Finances255 Questions
Select questions type
A(n) ________ serves as an entry point to a variety of resources on an organization's information network.
(Multiple Choice)
4.9/5
(37)
A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected, and usually undesirable, event for the user of the software.
(True/False)
4.8/5
(33)
One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.
(True/False)
5.0/5
(37)
A company that wanted to provide a single, unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing a(n)
(Multiple Choice)
4.8/5
(29)
Many businesses choose to open their intranets to other selected organizations through the use of
(Multiple Choice)
4.8/5
(34)
Computer technology has become so stable and mature in recent years that, except for problems caused by viruses and hackers, major glitches are essentially a thing of the past.
(True/False)
5.0/5
(37)
The first step a manager should take to cope with information overload is to
(Multiple Choice)
4.8/5
(40)
Internal networking shares the resources of all computers with each networked computer.
(True/False)
4.9/5
(44)
An intranet is a companywide network that is based on Internet-type technology, but closed to public access.
(True/False)
4.9/5
(25)
Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.
(True/False)
4.8/5
(36)
A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.
(True/False)
4.8/5
(29)
When Cy first came to work for Epic Electronics, the application of business technology was called
(Multiple Choice)
4.8/5
(23)
Which of the following observations would be the strongest evidence that Marshall Manufacturing has adopted knowledge technology?
(Multiple Choice)
4.7/5
(31)
Beginning with the late 1980s the goal of information technology was to
(Multiple Choice)
4.9/5
(41)
Because cloud computing is often too expensive for small businesses, it is rarely used.
(True/False)
4.8/5
(37)
A(n) ________ is someone who breaks into a computer system for illegal purposes.
(Multiple Choice)
4.9/5
(36)
Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.
(True/False)
4.9/5
(39)
Websites often send cookies to a user's computer that are saved on the computer's hard drive.
(True/False)
4.8/5
(43)
Showing 61 - 80 of 192
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)