Exam 13: Managing Information Systems and Communication Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the input-process-output model,which of the following is an output?

(Multiple Choice)
4.8/5
(32)

Darrell says that the most important online threat today is identity theft,but Melissa disagrees and says that the biggest threat is from viruses and malware.Which of the following statements would Darrell MOST likely agree with?

(Multiple Choice)
4.9/5
(31)

Generally speaking,local area networks are superior to wide area networks.

(True/False)
4.8/5
(33)

Which of the following is one of the most common forms of computer intrusion?

(Multiple Choice)
4.7/5
(24)

Middle managers are the largest MIS user group.

(True/False)
4.9/5
(35)

Why is software important to a computer's functioning?

(Multiple Choice)
4.8/5
(38)

A special form of artificial intelligence is called

(Multiple Choice)
4.7/5
(40)

Canadians spend more time on the internet each month than people in any other country.

(True/False)
4.8/5
(32)

The software programs that actually process data according to the needs of the user are known as

(Multiple Choice)
4.9/5
(35)

Lotus Domino 6.5 is an example of groupware software.

(True/False)
4.8/5
(41)

________ is a computer-based system that allows people to communicate simultaneously from different locations via software or telephone.

(Multiple Choice)
4.9/5
(46)

At which level of management would transaction processing systems most likely be essential?

(Multiple Choice)
4.9/5
(36)

Don wants to make sure that the users of his company's email system do not have their emails diverted to unauthorized recipients.To achieve this goal,Don would likely use

(Multiple Choice)
4.9/5
(35)

________ allow outsiders limited access to a firm's internal information systems.

(Multiple Choice)
4.8/5
(32)

Transaction processing systems imitate human behaviour by performing physical tasks using thought processes,sensing,and learning.

(True/False)
4.8/5
(39)

Which of the following is correct regarding firewalls?

(Multiple Choice)
4.7/5
(34)

When Walmart depends upon its private satellite network to link more than 2000 retail stores to its headquarters,it is using a

(Multiple Choice)
4.9/5
(32)

At Timbuk2's website,you can build your own messenger bag at different price levels with choices of size,fabric,colour combinations,and accessories.This is an example of how information technologies have

(Multiple Choice)
4.9/5
(31)

Individuals who download music from file-swapping networks are engaging in intellectual property theft.

(True/False)
4.8/5
(30)

Darrell says that the most important online threat today is identity theft,but Melissa disagrees and says that the biggest threat is from viruses and malware.Which of the following questions is the key point of debate between Darrell and Melissa?

(Multiple Choice)
4.8/5
(37)
Showing 101 - 120 of 197
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)