Exam 17: Managing Information
Exam 1: Management125 Questions
Exam 2: The History of Management120 Questions
Exam 3: Organizational Environments and Cultures121 Questions
Exam 4: Ethics and Social Responsibility115 Questions
Exam 5: Planning and Decision Making115 Questions
Exam 6: Organizational Strategy115 Questions
Exam 7: Innovation and Change115 Questions
Exam 8: Global Management115 Questions
Exam 9: Designing Adaptive Organizations115 Questions
Exam 10: Managing Teams115 Questions
Exam 11: Managing Human Resource Systems133 Questions
Exam 12: Managing Individuals and a Diverse Workforce115 Questions
Exam 13: Motivation115 Questions
Exam 14: Leadership110 Questions
Exam 15: Managing Communication115 Questions
Exam 16: Control116 Questions
Exam 17: Managing Information115 Questions
Exam 18: Managing Service and Manufacturing Operations115 Questions
Select questions type
TolTel Inc., an information technology firm, has created a network that allows its employees to easily access, share, and publish information using Internet software. The website has a firewall that separates the internal company network from the Internet, permitting authorized access only within the organization. It is evident that the network created by TolTel Inc. is a(n) _____.
(Multiple Choice)
4.8/5
(32)
A group of investigators are investigating a recent airplane crash in Lucitona. The investigators discovered debris of the aircraft, which provided them the information regarding the nature of the plane crash. But because the flight data recorder (a device that preserves the recent history of the flight) of the airplane was completely destroyed in the crash, the investigators were unable to determine what exactly went wrong. The absence of the flight data recorder led the investigators to call off the investigation. It can be concluded that the investigation was called off because:
(Multiple Choice)
4.9/5
(37)
ABD Tech has invested $20 million to install business intelligence software (BIS) at all of its branches across the globe so that it can access stored information in its servers for business analysis and decision-making purposes. In this scenario, the cost incurred by ABD Tech is an example of _____.
(Multiple Choice)
4.8/5
(39)
_____ transforms data into complex, scrambled digital codes that can be deciphered only by authorized users who possess unique keys to the data.
(Multiple Choice)
4.8/5
(30)
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.
(Multiple Choice)
4.8/5
(30)
Oreva, a multinational corporation, pays $100,000 per year to an information technology firm to archive and secure all of its data into the information technology firm's cloud platform. In this scenario, the cost incurred by Oreva is an example of _____.
(Multiple Choice)
4.9/5
(39)
In the context of protecting information, _____ is defined as the process of making sure users are who they claim to be.
(Multiple Choice)
5.0/5
(40)
One of the most common misunderstandings about information is that it is easy and cheap to retrieve after a company has it.
(True/False)
4.9/5
(41)
Which of the following statements is true of corporate portals?
(Multiple Choice)
4.8/5
(30)
Omaco, a technological firm, recently invested $20 million to design a data system that can access the already-stored information in the company servers at a higher speed than previous data systems. In this scenario, the money invested in the data system can be considered to be_____.
(Multiple Choice)
4.8/5
(31)
TEFCO, a computer processor manufacturing company, recently adopted a new fabrication process to manufacture microprocessors. The microprocessors made using this new process have higher computing power and clock speed than other processors available in the market. Although the new process has made TEFCO the industry leader, there is a threat that competitors will be able to match this feat in the near future. It is evident that TEFCO has achieved _____.
(Multiple Choice)
4.8/5
(40)
In the context of accessing and sharing information, _____ are private company networks that allow employees to easily access, share, and publish information using Internet software.
(Multiple Choice)
4.8/5
(36)
Which of the following is software that encrypts Internet data at both ends of the data transmission process?
(Multiple Choice)
4.9/5
(31)
In the context of accessing and sharing information, _____ allow company managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
(Multiple Choice)
4.8/5
(33)
Identify a true statement about manual capture of information.
(Multiple Choice)
4.8/5
(31)
KST Mart retains large amounts of customer data. To understand customer purchase behavior, the company uses a process that automatically discovers correlations in the collected data. Through this process, the company learns that people who buy bread, typically also buy a packet of butter. As a result, the manager of the supermarket places butter near the shelf that stocks bread. In this scenario, KST Mart has most likely used _____ to process information.
(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 115
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)