Exam 22: Managing Information and Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

IT does not include software.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

Orchestrating news releases,public announcements,and advertising for maximum benefit are examples of postaction control.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

When an employee can work from almost anywhere by plugging into the organization's information system,the organization has more flexible ____________________.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

work sites

Explain the Internet using ISPs,portal sites,intranets,firewalls,and extranets.

(Essay)
4.8/5
(38)

When VW redesigned the Beetle it used ____ with CAD expertise.

(Multiple Choice)
4.8/5
(36)

Information technology is comprised of which of the following?

(Multiple Choice)
4.8/5
(29)

Information systems are ____________________ and difficult to develop and implement.

(Short Answer)
5.0/5
(43)

During which stage of the development of an information system is the actual information system created?

(Multiple Choice)
4.9/5
(41)

Which of the following systems builds on a series of rules (frequently,if-then rules)to move from a set of data to a decision recommendation?

(Multiple Choice)
5.0/5
(35)

The control system for a computer-based information system consists of the computer software.

(True/False)
5.0/5
(27)

Match the following.You may use a response once,more than once,or not at all. Match the following.You may use a response once,more than once,or not at all.

(Essay)
4.8/5
(40)

____________________ refers to products such as cellular phones,PCs,and audio systems that can be custom-ordered and delivered the next day.

(Short Answer)
4.9/5
(34)

Carol made a donation to her church using her credit card online.After the transaction she received an email thank you note and confirmation.Which part of an information system does the email represent?

(Multiple Choice)
4.9/5
(39)

What is a transaction-processing system? Who would use such a system?

(Short Answer)
4.9/5
(36)

To prevent unauthorized access,many firms rely on ____________________: use of a secret numeric code to scramble the characters in the message,so that the message is not understandable during transmission.

(Short Answer)
4.9/5
(24)

A keyboard and bar code scanner are examples of

(Multiple Choice)
4.8/5
(39)

Information that provides a reliable and valid reflection of the real world is said to be

(Multiple Choice)
5.0/5
(40)

The headquarters building of a global corporation experienced a technical problem that disabled email for the afternoon.The work of over 200 employees came to a sudden stop.This is an example of which information system limitation?

(Multiple Choice)
4.8/5
(37)

Lotus 123 and Word Perfect are examples of

(Multiple Choice)
4.9/5
(30)

Rite Aid shares inventory information with Johnson and Johnson,General Mills,American Greetings,and numerous other suppliers.The limited access these companies share with each other's information systems is called a(n)

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 145
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)