Exam 13: Managing Information Systems and Communication Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A few years ago,Campbell Soup Co.developed a system to mimic the decision processes of one of its long-time soup makers.This was an example of

(Multiple Choice)
4.8/5
(39)

Customer order-taking by online retailers is an example of

(Multiple Choice)
4.8/5
(34)

A study by the Institute for Policy Innovation estimates the annual loss from intellectual property theft at about $100 billion.

(True/False)
4.8/5
(33)

Darrell says that the most important online threat today is identity theft,but Melissa disagrees and says that the biggest threat is from viruses and malware.Melissa is assuming which of the following?

(Multiple Choice)
4.9/5
(36)

With regard to information system (IS)applications,it is correct to say that

(Multiple Choice)
4.8/5
(37)

At Timbuk2's website,you can "build your own" custom messenger bag at different price levels with choices of size,fabric,colour combinations,accessories,liner material,strap,and even left- or right-hand access.This is an example of how IT has facilitated mass customization.

(True/False)
4.9/5
(41)

Rosalyn is involved with applications or systems such as CAD,CAM,AI,robotics,and expert systems.She is most likely to belong to which user group?

(Multiple Choice)
4.8/5
(29)

What is a management information system?

(Essay)
4.7/5
(32)

Computer analysis and graphics programs that are used to create new products are known as

(Multiple Choice)
4.8/5
(30)

An executive support system is

(Multiple Choice)
4.9/5
(41)

What is the difference between data and information?

(Essay)
4.7/5
(28)

Middle managers need information to _______________,while knowledge workers need information to ____________.

(Multiple Choice)
4.8/5
(47)

Suman is a first-line manager at a flooring company.The most important type of information she would need from the company's information system would include things like lists of incoming customer orders and daily delivery schedules to customers in her territories.

(True/False)
4.8/5
(25)

Who are the key users of information systems?

(Essay)
5.0/5
(41)

Digging in trash,luring internet users to bogus websites,and stealing mail are tactics normally used in

(Multiple Choice)
4.9/5
(40)

The ________ is the system of universally accepted standards for storing,retrieving,formatting,and displaying information.

(Multiple Choice)
4.8/5
(36)

Products ranging from cell phones to auto parts are created using ________ software because it allows faster designs at lower costs compared to manual modelling methods.

(Multiple Choice)
4.8/5
(35)
Showing 181 - 197 of 197
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)