Exam 22: Appendix: Using Technology to Manage Information
Exam 1: Taking Risks and Making Profits Within the Dynamic Business Environment315 Questions
Exam 2: Understanding Economics and How It Affects Business305 Questions
Exam 3: Doing Business in Global Markets346 Questions
Exam 4: Demanding Ethical and Socially Responsible Behavior257 Questions
Exam 5: How to Form a Business342 Questions
Exam 6: Entrepreneurship and Starting a Small Business303 Questions
Exam 7: Management and Leadership281 Questions
Exam 8: Structuring Organizations for Todays Challenges364 Questions
Exam 9: Production and Operations Management321 Questions
Exam 10: Motivating Employees357 Questions
Exam 11: Human Resource Management: Finding and Keeping the Best Employees423 Questions
Exam 12: Dealing With Employeemanagement Issues297 Questions
Exam 13: Marketing: Helping Buyers Buy250 Questions
Exam 14: Developing and Pricing Goods and Services356 Questions
Exam 15: Distributing Products314 Questions
Exam 16: Using Effective Promotions262 Questions
Exam 17: Understanding Accounting and Financial Information362 Questions
Exam 18: Financial Management297 Questions
Exam 19: Using Securities Markets for Financing and Investing Opportunities397 Questions
Exam 20: Money, Financial Institutions, and the Federal Reserve306 Questions
Exam 21: Appendix: Working Within the Legal Environment242 Questions
Exam 22: Appendix: Using Technology to Manage Information192 Questions
Exam 23: Appendix: Managing Risk128 Questions
Exam 24: Appendix: Managing Personal Finances255 Questions
Select questions type
The increasing use of computer networks has made computer security more complicated.
(True/False)
4.9/5
(33)
The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.
(True/False)
4.7/5
(41)
Cy is excited about the ability of customers to obtain access to information on Epic's network so that the company can provide them with better service. This suggests that Epic's is making use of a(n)
(Multiple Choice)
4.8/5
(33)
Fran is shopping online for jeans and she clicks on a style she likes. The site quickly presents her with a close-up view and additional information that will help her make a decision. When she adds the jeans to her shopping bag, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Fran and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called
(Multiple Choice)
4.9/5
(30)
Scientists and engineers at Epic Electronics rely on the Internet to keep in touch with their peers at various universities and research organizations. In recent years these researchers have become frustrated because the increasing congestion on the Internet has disrupted their attempts to communicate and collaborate with colleagues at other institutions. Which of the following developments would be most likely to help Epic Electronics researchers overcome this problem?
(Multiple Choice)
4.7/5
(31)
A company can use a(n) ________ to prevent unauthorized outsiders from accessing information on its intranet.
(Multiple Choice)
4.9/5
(35)
What is the key difference between an intranet and an extranet? Why might a firm use a virtual private network instead of an extranet?
(Essay)
4.9/5
(34)
Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.
(True/False)
4.8/5
(34)
Most successful businesses utilize social media to communicate with customers. An important strategy for consideration is: Successfully implementing social media will
(Multiple Choice)
4.8/5
(32)
When it comes to computers and information technology, government and corporate security officials are now most worried about
(Multiple Choice)
4.9/5
(30)
________ is a form of virtualization in which a company's data and applications are stored offsite.
(Multiple Choice)
4.9/5
(37)
________ is information charged with enough intelligence to make it relevant and useful.
(Multiple Choice)
4.9/5
(38)
The Internet has greatly slowed the spread of computer viruses by making it possible to share programs and files by downloading them from online sources rather than sharing diskettes.
(True/False)
4.8/5
(38)
If a business wanted to gather up-to-the-minute data on its customers, one way to do that would be
(Multiple Choice)
4.9/5
(39)
The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on
(Multiple Choice)
4.9/5
(33)
Some advantages of cloud computing include flexible capacity and easier access.
(True/False)
4.9/5
(31)
A local university, connected to Internet2, employs several professors in its school of engineering that are part of a research project that makes extremely heavy use of the bandwidth this connection provides. In fact, the engineering professors would like to get even more bandwidth. Given the way its designers set up Internet2, the researchers at the university
(Multiple Choice)
4.8/5
(27)
Gretchen works for Securitas Financial Group, but she seldom sees the inside of the offices. Instead, she does most of her work in a home office she put together in a spare bedroom. Her computer is linked to Securitas's office, so her work is distributed as quickly and efficiently as if she were at the office. Gretchen is one of the increasing number of workers who
(Multiple Choice)
4.9/5
(41)
Showing 141 - 160 of 192
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)