Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant154 Questions
Exam 2: Business Ethics and Social Responsibility: Doing Well by Doing Good168 Questions
Exam 3: Economics: The Framework for Business170 Questions
Exam 4: The World Market-Place: Business Without Borders181 Questions
Exam 5: Business Formation: Choosing the Form That Fits145 Questions
Exam 6: Small Business and Entrepreneurship: Economic Rocket Fuel157 Questions
Exam 7: Accounting: Decision Making by the Numbers188 Questions
Exam 8: Finance: Acquiring and Using Funds to Maximize Value154 Questions
Exam 9: Financial Markets: Allocating Financial Resources166 Questions
Exam 10: Marketing: Building Profitable Customer Connections183 Questions
Exam 11: Product and Promotion: Creating and Communicating Value335 Questions
Exam 12: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price175 Questions
Exam 13: Management, Motivation, and Leadership: Bringing Business to Life213 Questions
Exam 14: Human Resource Management: Building a Top-Quality Workforce140 Questions
Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link163 Questions
Exam 16: Operations Management: Putting It All Together167 Questions
Exam 17: Business Communication: Creating and Delivering Messages That Matter175 Questions
Exam 18: Labour Unions and Collective Bargaining46 Questions
Exam 19: Business Law60 Questions
Exam 20: Personal Finance67 Questions
Select questions type
Once you install antivirus software on your computer, you are secured against viruses for life.
(True/False)
4.8/5
(40)
What type of e-commerce involves businesses buying and selling supplies, components, machinery, equipment, or services from other businesses?
(Multiple Choice)
4.8/5
(32)
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
(True/False)
4.8/5
(31)
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
(True/False)
5.0/5
(43)
Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
(True/False)
4.8/5
(38)
Explain each of the basic elements of computer technology: hardware, software, and networks. Describe one key trend in each area.
(Essay)
4.8/5
(44)
Travelocity, Expedia, and Amazon.com are all examples of what type of e-commerce?
(Multiple Choice)
4.8/5
(33)
Comcast is advertising a new paperless statement program. With a few clicks of the mouse, you can now get your bill, pay it, and get a receipt. What is this an example of?
(Multiple Choice)
4.9/5
(32)
Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.
(True/False)
4.7/5
(38)
What do we call the technique of combining the processing power of hundreds or thousands of computers to work on different elements of a problem simultaneously?
(Multiple Choice)
4.8/5
(36)
Which of the following are hackers with malicious intent to do harm, steal identities, or disrupt business?
(Multiple Choice)
4.9/5
(33)
A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.
(True/False)
4.9/5
(37)
Information technology raises a number of legal and ethical challenges. Which of the following is one of these challenges?
(Multiple Choice)
4.9/5
(34)
A query is a request for the database management software to search for data that matches specific criteria.
(True/False)
4.9/5
(43)
How does piracy hurt people as it becomes more widespread?
(Multiple Choice)
4.8/5
(35)
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
(True/False)
5.0/5
(29)
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
(True/False)
4.8/5
(36)
Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.
(True/False)
4.8/5
(25)
Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.
(True/False)
4.8/5
(37)
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
(True/False)
4.9/5
(44)
Showing 141 - 160 of 163
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)