Exam 4: Hardware and Software
Exam 1: Information Systems and You87 Questions
Exam 2: Business Process Management and Decision Making91 Questions
Exam 3: Productivity, innovation and Strategy90 Questions
Exam 4: Hardware and Software112 Questions
Exam 5: Database and Content Management90 Questions
Exam 6: Networks and Collaboration97 Questions
Exam 7: Competitive Advantage and Business Proces96 Questions
Exam 8: Decision Making and Business Intelligence103 Questions
Exam 9: E-Commerce, social Networking and Web 2.085 Questions
Exam 10: Acquiring Information Systems Through Projects82 Questions
Exam 11: Structure, governance and Ethics80 Questions
Exam 12: Managing Information Security and Privacy88 Questions
Exam 13: Business Process Modeling: Techniques, Rules, and Applications38 Questions
Exam 14: Excel Basics: Understanding Spreadsheets, Cells, and Formulas39 Questions
Exam 15: Database Design and Entity Relationships65 Questions
Exam 16: Creating and Utilizing Forms, Queries, and Reports in MS Access39 Questions
Exam 17: Understanding MS Project: Features and Functions32 Questions
Select questions type
Volatile memory ________ data when the power is turned off.
(Multiple Choice)
4.8/5
(40)
Explain why it is important for a manager to know how computers work.
(Essay)
4.9/5
(31)
What are the differences between volatile and nonvolatile memory? Give an example of each.Why is this important to know in business?
(Essay)
4.9/5
(37)
Sometimes virus attacks are brought on by the negligence and ignorance of the user.
(True/False)
4.9/5
(39)
________ is installed in special,read-only memory in devices like printers or communication devices.
(Multiple Choice)
4.8/5
(33)
A virus delivers a(n)________ when its program deletes programs and data.
(Multiple Choice)
4.7/5
(36)
________ software consists of programs that perform business functions like general ledger and accounting.
(Multiple Choice)
4.9/5
(42)
To keep from getting a virus on your computer,be sure never to download files,programs,or attachments from ________ web sites.
(Multiple Choice)
4.8/5
(31)
Software vendors intentionally leave security holes in their software so they can charge for patches and fixes later.
(True/False)
4.9/5
(31)
What of the following is not a function of the central processing unit?
(Multiple Choice)
4.8/5
(42)
Reading articles about technology trends specific to your business,attending workshops on technology trends,and reading technology ads are all examples of
(Multiple Choice)
5.0/5
(33)
Showing 61 - 80 of 112
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)