Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant154 Questions
Exam 2: Business Ethics and Social Responsibility: Doing Well by Doing Good168 Questions
Exam 3: Economics: The Framework for Business170 Questions
Exam 4: The World Market-Place: Business Without Borders181 Questions
Exam 5: Business Formation: Choosing the Form That Fits145 Questions
Exam 6: Small Business and Entrepreneurship: Economic Rocket Fuel157 Questions
Exam 7: Accounting: Decision Making by the Numbers188 Questions
Exam 8: Finance: Acquiring and Using Funds to Maximize Value154 Questions
Exam 9: Financial Markets: Allocating Financial Resources166 Questions
Exam 10: Marketing: Building Profitable Customer Connections183 Questions
Exam 11: Product and Promotion: Creating and Communicating Value335 Questions
Exam 12: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price175 Questions
Exam 13: Management, Motivation, and Leadership: Bringing Business to Life213 Questions
Exam 14: Human Resource Management: Building a Top-Quality Workforce140 Questions
Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link163 Questions
Exam 16: Operations Management: Putting It All Together167 Questions
Exam 17: Business Communication: Creating and Delivering Messages That Matter175 Questions
Exam 18: Labour Unions and Collective Bargaining46 Questions
Exam 19: Business Law60 Questions
Exam 20: Personal Finance67 Questions
Select questions type
What type of e-commerce involves the purchase of consumer goods and services, including clothing, music, and even investments?
(Multiple Choice)
4.8/5
(42)
Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.
(True/False)
4.7/5
(39)
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
(True/False)
4.8/5
(32)
The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.
(True/False)
4.8/5
(41)
Which of the following is a technology that stores information, such as a unique serial number, on a microchip and transmits it to a reader that's within range?
(Multiple Choice)
4.8/5
(37)
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
(True/False)
5.0/5
(36)
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
(True/False)
4.9/5
(32)
What do we call skilled computer users who try to gain unauthorized access to other people's computers?
(Multiple Choice)
4.9/5
(44)
What are hard drives, keyboards, monitors, and printers examples of?
(Multiple Choice)
4.8/5
(38)
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
(True/False)
4.9/5
(36)
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.
(True/False)
4.9/5
(32)
According to the Business Software Alliance, an organization dedicated to combating the piracy of software, approximately what percentage of all software installed on computers in 2013 was illegally obtained, resulting in the loss of over $62 billion in revenue to software companies?
(Multiple Choice)
4.9/5
(28)
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
(True/False)
4.7/5
(36)
Which of the following is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product?
(Multiple Choice)
4.7/5
(35)
Copyright law gives the creators of their property exclusive rights to do what?
(Multiple Choice)
4.9/5
(31)
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
(True/False)
4.9/5
(33)
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
(True/False)
4.7/5
(36)
Showing 41 - 60 of 163
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)