Exam 16: Managing Information in a Global World

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of personal computer security measure would salespeople who are on the road dealing with customers' questions want the company to use? Why?

(Essay)
4.9/5
(28)

The two activities necessary to properly secure data and data networks are the use of firewalls and antivirus software.

(True/False)
4.7/5
(32)

Police departments across North America are increasingly turning to body-worn cameras to provide evidence in volatile situations. Which characteristic of information is MOST LIKELYthe reason departments are using body-worn cameras?

(Multiple Choice)
4.7/5
(32)

Unsupervised data mining is unethical.

(True/False)
4.8/5
(30)

Why do the large majority of companies now use intranets?

(Multiple Choice)
4.9/5
(46)

Why do the large majority of companies now use intranets?

(Multiple Choice)
4.9/5
(38)

Moore's law accounts for the rapid increase in power and reduction in both size and price of computer equipment over the past 35 years.

(True/False)
4.8/5
(40)

What is the term for the concept that information should pertain to the problems you're trying to solve?

(Multiple Choice)
4.7/5
(40)

Data and information are the same as knowledge.

(True/False)
4.9/5
(35)

Recalls are a fact of life for the food industry according to a senior vice-president of a large Canadian supermarket chain. What technology should this company use to identify the location of products in its warehouse that have been recalled?

(Multiple Choice)
4.9/5
(43)

The costs of complying with privacy legislation are best represented by which type of information costs?

(Multiple Choice)
4.8/5
(41)

Virtual private networks and secure sockets layer (SSL)encryption perform basically the same function.

(True/False)
4.8/5
(40)

Pioneering differential refers to the strategic advantage that companies earn by being the first in an industry to use new information technology to substantially lower costs or to differentiate a product or service from competitors.

(True/False)
4.9/5
(39)

Many postsecondary institutions have a policy that final grades for a semester must be entered into the system within a few days of completing the semester. Which concept regarding information is being reinforced with this policy?

(Multiple Choice)
4.9/5
(33)

The establishment of which of the following is an information security procedure that encrypts Internet data at both ends of the transmission process?

(Multiple Choice)
4.9/5
(39)

Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users,but no one else.

(True/False)
5.0/5
(44)

Define each characteristic that's required for information to be useful,and provide an example of each.

(Essay)
4.8/5
(39)

Why would a company use a decision support system (DSS)?

(Multiple Choice)
4.8/5
(38)

Many industry associations collect market research data. Companies use this market research data to fill in gaps in their own data collection. What costs are associated with this data?

(Multiple Choice)
4.9/5
(32)

Define each of the costs associated with useful information and provide an example of each.

(Essay)
4.8/5
(39)
Showing 101 - 120 of 158
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)