Exam 4: Technological Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is hardware or software designed to prevent unauthorized access to or from a private network?

Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
Verified

C

Technology planning involves evaluating the company's goals and objectives and choosing the right technology to reach them.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

What is one of the most important roles of an automated accounting process?

Free
(Essay)
5.0/5
(37)
Correct Answer:
Verified

monitoring revenues and expenses

Most of the information used to make decisions in business is proprietary.

(True/False)
4.8/5
(30)

What is information technology (IT)?

(Essay)
4.9/5
(38)

Amazon, Shop.ca, and Alibaba are called channel disruptors.

(True/False)
4.8/5
(36)

In technology planning, which aspects must businesses consider?

(Multiple Choice)
4.8/5
(35)

A process that involves designing the evolution of technology to achieve a desired-end state is referred to as which of the following?

(Multiple Choice)
5.0/5
(38)

Many companies have hired a chief information officer (CIO) to be responsible for managing all information resources.

(True/False)
4.9/5
(31)

Which of the following is a big advantage that technology brings for some employees?

(Multiple Choice)
5.0/5
(30)

Canada has shifted from an industrial society to an export-based economy.

(True/False)
4.8/5
(29)

Hardware or software designed to prevent unauthorized access to or from a private network is referred to as a brickwall.

(True/False)
5.0/5
(32)

Which of the following refers to the practical application of knowledge?

(Multiple Choice)
5.0/5
(29)

Technology transfer is typically protected by trademarks.

(True/False)
4.7/5
(33)

Businesses can minimize overhead by getting rid of the "brick" and moving to the click.

(True/False)
4.7/5
(36)

What does the term "network effects" describe?

(Essay)
4.8/5
(39)

Which of the following is one of the most important roles that automated accounting functions are used for?

(Multiple Choice)
4.7/5
(38)

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, what types of issues are software companies addressing?

(Multiple Choice)
4.8/5
(36)

Which of the following is a term used to describe a formal transfer of rights to use technology from the developer to another party?

(Multiple Choice)
5.0/5
(38)

Which of the following is NOT one of the activities that businesses monitor through technology?

(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)