Exam 14: Information Technology Itfor Business
Exam 1: The US Business Environment110 Questions
Exam 2: Understanding Business Ethics and Social Responsibility106 Questions
Exam 3: Entrepreneurship, New Ventures, and Business Ownership122 Questions
Exam 4: Understanding the Global Context of Business105 Questions
Exam 5: Managing the Business105 Questions
Exam 6: Organizing the Business108 Questions
Exam 7: Operations Management and Quality119 Questions
Exam 8: Employee Behavior and Motivation114 Questions
Exam 9: Leadership and Decision Making112 Questions
Exam 10: Human Resource Management and Labor Relations124 Questions
Exam 11: Marketing Processes and Consumer Behavior116 Questions
Exam 12: Developing and Pricing Products110 Questions
Exam 13: Distributing and Promoting Products116 Questions
Exam 14: Information Technology Itfor Business108 Questions
Exam 15: The Role of Accountants and Accounting Information109 Questions
Exam 16: Understanding Money and the Role of Banking110 Questions
Exam 17: Managing Business Finances118 Questions
Select questions type
Identify the threats and risks information technology poses on businesses.
(Essay)
4.8/5
(45)
Who is the person in charge of operating the systems used for gathering,organizing,and distributing information?
(Multiple Choice)
4.7/5
(34)
A router scrambles e-mail messages to get around security systems.
(True/False)
4.9/5
(38)
One pitfall with VSAT satellite communications is that they tend to lack privacy.
(True/False)
4.7/5
(40)
How can e-commerce help businesses with scattered geographical locations better compete?
(Multiple Choice)
4.9/5
(39)
Which of the following BEST describes enterprise resource planning?
(Multiple Choice)
4.8/5
(43)
Which type of software searches incoming e-mail and data for indications of a known virus?
(Multiple Choice)
4.9/5
(44)
In a client-server network,the client is typically a customer or supplier.
(True/False)
4.7/5
(39)
Discuss the impacts information technology has had on the business world.
(Essay)
4.9/5
(41)
Spyware authors can use stolen information to create their own intellectual property.
(True/False)
4.8/5
(28)
Computer-aided design (CAD)can increase the productivity of knowledge workers.
(True/False)
4.8/5
(41)
Which type of IT threat can spread without a computer user needing to open any software?
(Multiple Choice)
4.9/5
(36)
What type of hack floods a network with bogus requests for information and resources,overloading and shutting down the network?
(Multiple Choice)
4.8/5
(33)
Enterprise resource planning (ERP)may allow a firm to check on the status of any customer order for specific products.
(True/False)
4.9/5
(33)
Showing 41 - 60 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)