Exam 22: Appendix: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Bandwidth is the term used to describe the rate at which data flows through the Internet.

(True/False)
4.9/5
(36)

The use of antivirus software completely eliminates the risk of downloading infected files.

(True/False)
4.8/5
(40)

High-quality information is

(Multiple Choice)
4.9/5
(31)

Enterprise portals are simply web pages with links to company-specific products and services.

(True/False)
4.8/5
(27)

Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.

(True/False)
4.7/5
(35)

RFID devices collect biological data.

(True/False)
4.9/5
(46)

In the 1970s, business technology was known as

(Multiple Choice)
4.8/5
(31)

When ransomware holds your data hostage, what is most likely to happen?

(Multiple Choice)
4.9/5
(42)

In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.

(True/False)
4.9/5
(41)

One of the most revolutionary impacts computer technology has had on business has been to

(Multiple Choice)
4.9/5
(27)

________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.

(Multiple Choice)
4.8/5
(32)

Jeff's bank recently contacted him to tell him someone illegally accessed the bank's computer system and gained access to information about customer account numbers and PIN numbers. The bank is recommending Jeff and other customers change their account numbers and access numbers for security reasons. The bank and Jeff are victims of a

(Multiple Choice)
4.9/5
(36)

Edwin, a sales manager, just finished reading some sales statistics comparing his company's performance to that of competitors. The statistics summarize a mass of raw figures into a few meaningful measures that Edwin will use to determine whether he needs to change his sales strategy. The statistics in the printout are

(Multiple Choice)
4.9/5
(36)

Most e-mail messages are automatically encrypted to protect them from being intercepted and read by hackers.

(True/False)
4.8/5
(34)

Which of the following is an advantage of telecommuting?

(Multiple Choice)
4.9/5
(28)

The three types of cloud computing are

(Multiple Choice)
4.8/5
(34)

It is illegal for companies to scan e-mails written by their employees at work unless the employees have given permission in advance or the firm has received approval from a federal judge.

(True/False)
4.8/5
(25)

Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.

(True/False)
4.9/5
(32)

Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.

(True/False)
4.8/5
(36)

A basic truth in management is that you can never have too much information.

(True/False)
4.8/5
(39)
Showing 161 - 180 of 192
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)