Exam 13: Managing Information Systems and Communication Technology
Exam 1: Understanding the Canadian Business System213 Questions
Exam 2: Understanding the Environments of Business225 Questions
Exam 3: Conducting Business Ethically and Responsibly237 Questions
Exam 4: Understanding Entrepreneurship, small Business, and New Venture Creation221 Questions
Exam 5: The Global Context of Business213 Questions
Exam 6: Managing the Business Enterprise252 Questions
Exam 8: Managing Human Resources228 Questions
Exam 9: Understanding Labourmanagement Relations163 Questions
Exam 10: Motivating and Leading Employees261 Questions
Exam 11: Producing Goods and Services201 Questions
Exam 12: Increasing Productivity and Quality175 Questions
Exam 13: Managing Information Systems and Communication Technology197 Questions
Exam 14: Understanding Accounting Issues212 Questions
Exam 15: Understanding Marketing Processes and Consumer Behaviour227 Questions
Exam 16: Developing and Promoting Goods and Services241 Questions
Exam 17: Pricing and Distributing Goods and Services232 Questions
Exam 18: Understanding Money and Banking207 Questions
Exam 19: Understanding Securities and Investments190 Questions
Exam 20: Financial Decisions and Risk Management228 Questions
Select questions type
Describe the ways that organizations try to protect their IT systems.
(Essay)
4.9/5
(37)
Computer-aided manufacturing (CAM)is used to design manufacturing facilities,while computer-aided design assists in designing the products that are produced in the manufacturing facility.
(True/False)
4.9/5
(34)
Bank customers can now access 24-hour information systems and monitor their accounts without employee assistance.This is an example of how information technologies have
(Multiple Choice)
4.8/5
(34)
Expert systems attempt to imitate the thought processes of human experts in a given field.
(True/False)
4.9/5
(34)
Identity thieves are generally caught by authorities,but the penalties they receive are not very severe.
(True/False)
4.9/5
(40)
Why are hackers a problem,and how do organizations protect against them?
(Essay)
4.9/5
(33)
Computer-aided design (CAD)is an example of an information system for knowledge workers.
(True/False)
4.8/5
(28)
Software piracy refers to the stealing of computer accessories like keyboards and monitors.
(True/False)
4.8/5
(36)
The rapid growth of information technologies has changed the very structure of business organizations.All of the following are examples of changes except
(Multiple Choice)
4.7/5
(41)
America Online customers received an email notifying them of a billing problem with their AOL accounts.The email displayed AOL logos and legitimate-looking links,but it was a fake.This was an example of
(Multiple Choice)
4.7/5
(35)
In the input-process-output model,which of the following is an input?
(Multiple Choice)
4.7/5
(28)
A(n)________ is software and hardware that prevent outsiders from accessing a company's internal network.
(Multiple Choice)
4.7/5
(33)
When Equifax Canada's security system was breached and outsiders gained access to personal information on hundreds of Canadians,this was an example of computer hacking.
(True/False)
4.9/5
(37)
Mel says that developments in information technology have had a huge impact in communication and in access to data.Marla agrees that information is important,but thinks that how it is used is even more important,and she cites the dramatic developments in online selling as an example.What is Marla assuming?
(Multiple Choice)
5.0/5
(38)
Ball Corp.has a new flexible production process that generates customized products in high volumes at low costs.The company is using
(Multiple Choice)
4.8/5
(29)
Showing 61 - 80 of 197
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)