Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Push technologies can give managers a crucial competitive edge by providing them with good quality information quickly and conveniently.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

Which of the following links computer resources using either a wired or wireless connection?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

C

What is the difference between data and information? What is the purpose of a business intelligence system,and how does it help convert data to information?

Free
(Essay)
4.8/5
(40)
Correct Answer:
Verified

Data refers to the facts and figures a firm collects.Data in their raw form are seldom very useful because they lack the context to give them meaning.Data become information when they are processed,organized,and presented in a way that makes them useful to a decision maker.
Most firms collect vast amounts of data.They often develop decision support systems (DSS)that give managers access to large amounts of data and the processing power to convert this data into high-quality information.Business intelligence systems are the newest version of DSS.These systems usually take advantage of data mining,which consists of powerful statistical and mathematical techniques to find hidden relationships among variables that are buried in the masses of data a firm collects.These newly discovered relationships can help managers identify previously unseen opportunities and devise new strategies to take advantage of them.

A firewall is special material software that hackers place on your computer to prevent you from accessing your data.

(True/False)
4.9/5
(31)

Which of the following are skilled computer users who try to gain unauthorized access to other people's computers?

(Multiple Choice)
4.8/5
(28)

Opt-in e-mails are the same as spam because they are unwanted messages.

(True/False)
4.8/5
(30)

Data are facts and figures.vThese data do not become information until they are organized and presented in a way that makes them useful to the end user.

(True/False)
4.8/5
(39)

So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.

(True/False)
4.9/5
(29)

Which of the following can protect your computer from data corruption,pop-up ads,hackers,identity theft,and other online-related threats?

(Multiple Choice)
4.7/5
(31)

TurboTax™ is a software program that takes the customer through a series of tax-related questions.Based on the customer's responses,the system will select the next question.In the end,it provides all the information the customer needs to file a return to Canada Revenue Agency,including the amount of taxes owed or the amount of a refund to expect.TurboTaxᵀᴹ is an example of an expert system.

(True/False)
4.8/5
(34)

The Internet is a network of networks,consisting of hundreds of thousands of smaller networks,operating under a common set of rules so each can communicate with the others.

(True/False)
4.9/5
(25)

Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.

(True/False)
4.8/5
(34)

Transforming data into useful information for decision makers is the vital function of which of the following?

(Multiple Choice)
4.7/5
(28)

Businesses use pull technology to automatically deliver information quickly and conveniently to an end user's computer desktop.

(True/False)
4.8/5
(35)

Which of the following is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product?

(Multiple Choice)
4.8/5
(35)

Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.

(True/False)
4.8/5
(40)

Businesses develop intranets so valued customers have access to internal information that is not available to the general public.

(True/False)
4.9/5
(31)

Black-hat hackers are hackers who have no harmful intent.Instead they hack into computers simply for the intellectual challenge it involves.

(True/False)
4.9/5
(33)

Horizontal market software consists of highly specialized applications used in a particular industry such as medicine,law,or accounting.

(True/False)
4.8/5
(35)

Which of the following performs the critical functions necessary to operate the computer at its most basic level,such as managing the file system,reading programs into the main memory,and allocating computer memory among various tasks?

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)