Exam 12: Technology, Organizations, and Society
Exam 1: The Corporation and Its Stakeholders52 Questions
Exam 2: Managing Public Issues and Stakeholder Relationships51 Questions
Exam 3: Corporate Social Responsibility52 Questions
Exam 4: Ethics and Ethical Reasoning52 Questions
Exam 5: Organizational Ethics and the Law52 Questions
Exam 6: The Challenges of Globalization51 Questions
Exam 7: Global Corporate Citizenship52 Questions
Exam 8: Business-Government Relations52 Questions
Exam 9: Influencing the Political Environment52 Questions
Exam 10: Ecology and Sustainable Development in Global Business52 Questions
Exam 11: Managing Environmental Issues52 Questions
Exam 12: Technology, Organizations, and Society52 Questions
Exam 13: Managing Technology and Innovation52 Questions
Exam 14: Stockholder Rights and Corporate Governance52 Questions
Exam 15: Consumer Protection51 Questions
Exam 16: Employees and the Corporation52 Questions
Exam 17: Managing a Diverse Workforce52 Questions
Exam 18: The Community and the Corporation52 Questions
Exam 19: Managing Public Relations52 Questions
Select questions type
The use of publicly accessed servers to store users' text photos, videos and other data at remote sites, rather than on their own computers is called:
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
D
Nations have tended to move sequentially through each phase of technology, beginning with the lowest technology and moving higher with each step.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
Businesses generally discovered that the adoption of technology was a money-saver rather than an expense in the short run.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
A hacking technique that redirects a user's computer from a legitimate Web site to another site by altering the user's computer or router is called:
(Multiple Choice)
4.8/5
(34)
By 2008, the ratio of computers to students in the United States was:
(Multiple Choice)
4.7/5
(31)
The buying and selling of goods and services electronically is called:
(Multiple Choice)
4.9/5
(35)
A group of people who leap to the most dreadful conclusions while researching health matters online are called:
(Multiple Choice)
4.9/5
(28)
Technology is an unmistakable ethical force, but not an economic or social force, in the world where we live.
(True/False)
4.9/5
(38)
In 2009, the global ratio of spam in e-mail traffic was 1 in every 1.32 e-mails.
(True/False)
4.9/5
(36)
A program designed to build, and market ultralightweight, durable netbook computers for children aged 6 through 12 throughout the world is called:
(Multiple Choice)
4.8/5
(33)
According to Bill Joy, Sun Microsystems' chief scientist, by 2030, we are likely to build machines a million times as powerful as the personal computer of today.
(True/False)
4.8/5
(34)
In the nomadic-agrarian phase of technology in society, people:
(Multiple Choice)
4.9/5
(32)
Future shock means change will happen too fast and shock itself to death.
(True/False)
4.9/5
(38)
Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to people's private e-mail addresses or cell phones?
(Multiple Choice)
4.8/5
(26)
High-technology businesses, governments, and community groups acting together appear to be winning the battle of making technology more accessible to all people regardless of their race, income, education, age, or residence.
(True/False)
4.9/5
(39)
Discuss what factors have fueled technological growth and development.
(Essay)
4.9/5
(40)
Since surfing the Internet for medical information is widespread, how can the quality of information provided online be verified as accurate or reliable?
(Essay)
4.7/5
(28)
The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)