Exam 13: Managing Information Systems and Communication Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the ways that organizations try to protect their IT systems.

(Essay)
4.9/5
(37)

Computer-aided manufacturing (CAM)is used to design manufacturing facilities,while computer-aided design assists in designing the products that are produced in the manufacturing facility.

(True/False)
4.9/5
(34)

Bank customers can now access 24-hour information systems and monitor their accounts without employee assistance.This is an example of how information technologies have

(Multiple Choice)
4.8/5
(34)

Expert systems attempt to imitate the thought processes of human experts in a given field.

(True/False)
4.9/5
(34)

The four different groups that have information needs are

(Multiple Choice)
4.8/5
(33)

What is a decision support system?

(Essay)
4.8/5
(34)

What are the building blocks of IT?

(Essay)
4.8/5
(31)

Identity thieves are generally caught by authorities,but the penalties they receive are not very severe.

(True/False)
4.9/5
(40)

Why are hackers a problem,and how do organizations protect against them?

(Essay)
4.9/5
(33)

Computer-aided design (CAD)is an example of an information system for knowledge workers.

(True/False)
4.8/5
(28)

IS knowledge workers include

(Multiple Choice)
4.9/5
(37)

Software piracy refers to the stealing of computer accessories like keyboards and monitors.

(True/False)
4.8/5
(36)

The rapid growth of information technologies has changed the very structure of business organizations.All of the following are examples of changes except

(Multiple Choice)
4.7/5
(41)

America Online customers received an email notifying them of a billing problem with their AOL accounts.The email displayed AOL logos and legitimate-looking links,but it was a fake.This was an example of

(Multiple Choice)
4.7/5
(35)

In the input-process-output model,which of the following is an input?

(Multiple Choice)
4.7/5
(28)

A(n)________ is software and hardware that prevent outsiders from accessing a company's internal network.

(Multiple Choice)
4.7/5
(33)

When Equifax Canada's security system was breached and outsiders gained access to personal information on hundreds of Canadians,this was an example of computer hacking.

(True/False)
4.9/5
(37)

Mel says that developments in information technology have had a huge impact in communication and in access to data.Marla agrees that information is important,but thinks that how it is used is even more important,and she cites the dramatic developments in online selling as an example.What is Marla assuming?

(Multiple Choice)
5.0/5
(38)

Why is electronic conferencing a desirable alternative for business?

(Essay)
4.9/5
(37)

Ball Corp.has a new flexible production process that generates customized products in high volumes at low costs.The company is using

(Multiple Choice)
4.8/5
(29)
Showing 61 - 80 of 197
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)