Exam 17: Managing Information
Exam 1: Management55 Questions
Exam 2: The History of Management50 Questions
Exam 3: Organizational Environments and Cultures51 Questions
Exam 4: Ethics and Social Responsibility51 Questions
Exam 5: Planning and Decision Making50 Questions
Exam 6: Organizational Strategy50 Questions
Exam 7: Innovation and Change50 Questions
Exam 8: Global Management50 Questions
Exam 9: Designing Adaptive Organizations50 Questions
Exam 10: Managing Teams51 Questions
Exam 11: Managing Human Resource Systems59 Questions
Exam 12: Managing Individuals and a Diverse Work Force50 Questions
Exam 13: Motivation50 Questions
Exam 14: Leadership50 Questions
Exam 15: Managing Communication50 Questions
Exam 16: Control50 Questions
Exam 17: Managing Information50 Questions
Exam 18: Managing Service and Manufacturing Operations54 Questions
Select questions type
In the context of protecting information,_________ makes sure that users are who they claim to be.A.encryption
B.authorizationC.decryptionD.authentication
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
authentication
_____ are private company networks that allow employees to easily access,share,and publish information using Internet software.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
Baxton Courier Services recently gave all its employees electronic tablets to accurately track the whereabouts of its shipments.In this process,the costs that Baxton Courier Services incurred is an example of _____ costs.
(Multiple Choice)
4.8/5
(36)
Data mining is the process of collecting large amounts of raw data from different sources.
(True/False)
4.8/5
(42)
Lailey Tech,a global customer service provider,spent $25 million on a new data center to keep its data safe at a single location.Which of the following costs best illustrates the expenditure on the new data center?
(Multiple Choice)
4.8/5
(43)
Which of the following is a software that encrypts Internet data at both ends of the transmission process?
(Multiple Choice)
4.7/5
(37)
Innove Tech is a technological firm that wants to build a global service delivery system.It has consulted a larger firm,Ziff Corp.,to obtain the proven technology required to establish this system.In the context of the costs of useful information,Innove Tech incurred _____ costs.
(Multiple Choice)
4.8/5
(40)
_________ are the two information technologies to capture and share the knowledge of consultants,specialists,and experts with other managers and workers.
A.Decision support systems and expert systems
B.Executive information systems and electronic data interchange
C.Virtual private networks and secure socket layer encryption
D.Data mining and two-factor authentication
(Essay)
4.8/5
(41)
The two basic methods of capturing information are _________.
A.systematic and unsystematic
B.manual and electronic
C.continuous and intermittent
D.functional and hierarchical
(Short Answer)
4.7/5
(35)
_________ occur when two or more database elements tend to occur together in a significant way.A.Association patterns
B.Data clustersC.Time seriesD.Predictive patterns
(Short Answer)
4.9/5
(37)
A company that has earned first-mover advantage is immune to competition.
(True/False)
4.9/5
(41)
Shop Ahead,a retail mart,conducted a survey on how long a customer waits in a queue for billing.Based on the results of the survey,the company planned to modify the number of employees at the billing counter.While checking out of the mart,Shop Ahead asked all its customers to fill a form indicating the time they spent in the queue.All customers reported that they waited for 2,5,or 10 minutes.Majority reported that they waited for 10 minutes.Based on the results,Shop Ahead added 10 cash counters to its existing 20.After a month,the management realized that the mart had more cash counters and employees than required.Which of the following is most likely the reason for the loss incurred due to overemployment in the mart?
(Multiple Choice)
4.8/5
(37)
_________ allow managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
A.Extranets
B.Firewalls
C.Corporate portals
D.Executive information systems
(Short Answer)
4.7/5
(33)
Which of the following best describes radio frequency identification (RFID)tags?
(Multiple Choice)
4.9/5
(36)
Retrieval cost is the cost of transmitting information from one place to another.
(True/False)
4.8/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)