Exam 17: Managing Information
Exam 1: Management121 Questions
Exam 1: Management: Part A11 Questions
Exam 1: Management: Part B12 Questions
Exam 2: History of Management106 Questions
Exam 2: History of Management: Part A11 Questions
Exam 2: History of Management: Part B12 Questions
Exam 3: Organizational Environments and Cultures121 Questions
Exam 3: Organizational Environments and Cultures: Part A12 Questions
Exam 3: Organizational Environments and Cultures: Part B12 Questions
Exam 4: Ethics and Social Responsibility123 Questions
Exam 4: Ethics and Social Responsibility: Part A11 Questions
Exam 4: Ethics and Social Responsibility: Part B10 Questions
Exam 5: Planning and Decision Making123 Questions
Exam 5: Planning and Decision Making: Part A11 Questions
Exam 5: Planning and Decision Making: Part B12 Questions
Exam 6: Organizational Strategy126 Questions
Exam 6: Organizational Strategy: Part A12 Questions
Exam 6: Organizational Strategy: Part B12 Questions
Exam 7: Innovation and Change120 Questions
Exam 7: Innovation and Change: Part A12 Questions
Exam 7: Innovation and Change: Part B11 Questions
Exam 8: Global Management121 Questions
Exam 8: Global Management: Part A12 Questions
Exam 8: Global Management: Part B12 Questions
Exam 9: Designing Adaptive Organizations136 Questions
Exam 9: Designing Adaptive Organizations: Part A11 Questions
Exam 9: Designing Adaptive Organizations: Part B11 Questions
Exam 10: Managing Teams140 Questions
Exam 10: Managing Teams: Part A11 Questions
Exam 10: Managing Teams: Part B12 Questions
Exam 11: Managing Human Resource Systems116 Questions
Exam 11: Managing Human Resource Systems: Part A11 Questions
Exam 11: Managing Human Resource Systems: Part B12 Questions
Exam 12: Managing Individuals and a Diverse Work Force120 Questions
Exam 12: Managing Individuals and a Diverse Work Force: Part A10 Questions
Exam 12: Managing Individuals and a Diverse Work Force: Part B11 Questions
Exam 13: Motivation146 Questions
Exam 13: Motivation: Part A11 Questions
Exam 13: Motivation: Part B12 Questions
Exam 14: Leadership140 Questions
Exam 14: Leadership: Part A10 Questions
Exam 14: Leadership: Part B10 Questions
Exam 15: Managing Communication131 Questions
Exam 15: Managing Communication: Part A11 Questions
Exam 15: Managing Communication: Part B13 Questions
Exam 16: Control122 Questions
Exam 16: Control: Part A10 Questions
Exam 16: Control: Part B12 Questions
Exam 17: Managing Information118 Questions
Exam 17: Managing Information: Part A11 Questions
Exam 17: Managing Information: Part B11 Questions
Exam 18: Managing Service and Manufacturing Operations125 Questions
Exam 18: Managing Service and Manufacturing Operations: Part A10 Questions
Exam 18: Managing Service and Manufacturing Operations: Part B12 Questions
Select questions type
____ is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
B
Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else.
Free
(True/False)
4.7/5
(40)
Correct Answer:
True
A(n) ____ is a private company network that allows employees to easily access, share, and publish information using Internet software.
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
C
Jupiter Communications
An entrepreneur developed Kibu.com as an online fashion magazine for girls between the ages of 13 and 18. The messages from Kibu's advertisers were tailored for and intriguing to a teenage audience. Revenue came from companies that sponsored various channels and features on the site, such as the Fashion Channel. Kibu had a loyalty program, the kPoints xChange, which gave site visitors an incentive to communicate with the site and its sponsors. Each time they did, they earned points that could be exchanged for merchandise such as CDs, movie tickets, or beaded jewelry. Visitors who filled out surveys could win one of the 10,000 Kibu Boxes. Box recipients got still more points if they went to the Box Channel and filled out forms telling one to three of the participating companies how they liked the products inside. By September 2000, however, the site closed, and its founders returned the remaining start-up capital to investors.
-Refer to Jupiter Communications. If a cosmetics manufacturer learned from analyzing the data that teenage girls who buy more than six bottles of nail polish monthly also like to dress up their pets to match their outfits, it would have used the survey results to identify a(n) ____ pattern. (The manufacturer could use this information to develop a line of pet nail polish.)
(Multiple Choice)
4.9/5
(37)
Data mining typically splits a data set in half, finds patterns in one half, and then tests the validity of those patterns by trying to find them again in the second half of the data set.
(True/False)
4.8/5
(35)
A data warehouse stores raw data that have been collected from a variety of sources for later use.
(True/False)
4.8/5
(34)
Unsupervised data mining can be used to recognize ____ patterns.
(Multiple Choice)
5.0/5
(39)
Unsupervised data mining is particularly good at identifying ____.
(Multiple Choice)
4.9/5
(34)
Pages listing all of the felony crimes perpetrated in a given city during the last decade would be an example of ____.
(Multiple Choice)
4.8/5
(41)
Intranets are private company networks that allow employees to easily access, share, and publish information using Internet software.
(True/False)
4.8/5
(34)
The three methods of tracing products through a distribution system are paper records, bar codes, and radio frequency identification tags. Which of the following statements about the tracing of products is true?
(Multiple Choice)
4.9/5
(44)
A(n) ____ uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance.
(Multiple Choice)
4.7/5
(35)
The two activities necessary to properly secure data and data networks are the use of firewalls and antivirus software.
(True/False)
5.0/5
(40)
The establishment of ____ is an information security procedure that encrypts Internet data at both ends of the transmission process.
(Multiple Choice)
4.9/5
(36)
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are ____.
(Multiple Choice)
4.9/5
(47)
Showing 1 - 20 of 118
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)