Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information systems that are designed to provide support for effective decision making are called operational support systems.

(True/False)
4.8/5
(23)

Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the firm's ________ system.

(Multiple Choice)
4.8/5
(35)

Margaret would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares, territories, and projected sales. In order to achieve maximum impact, Margaret should communicate her information to the company's senior executives using a ________.

(Multiple Choice)
4.7/5
(38)

An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.

(True/False)
4.7/5
(29)

The person who directs a firm's management information systems and related computer operations is often called the ________.

(Multiple Choice)
4.8/5
(27)

MATCHING Complete the following using the terms listed. -_____ consist of raw facts and figures that may or may not be relevant to business decisions.

(Multiple Choice)
4.9/5
(32)

Describe at least two ways in which common cybercrimes occur.

(Essay)
4.8/5
(32)

Brandon is trying to close a particularly difficult sale. He uses his PDA (personal digital assistant) and a special program to access information within his company's database on pricing. Brandon is using an ________.

(Multiple Choice)
4.9/5
(28)

Unlike Wi-Fi 's relatively limited geographic coverage area, generally around 300 feet, a single _____ access point can provide coverage over many miles.

(Multiple Choice)
4.8/5
(44)

Salvador downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n) ________.

(Multiple Choice)
4.7/5
(31)

MATCHING Complete the following using the terms listed. -A secure connection between two points on the Internet is known as a(n) _____.

(Multiple Choice)
4.9/5
(30)

Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer's browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a _____.

(Multiple Choice)
4.8/5
(42)

MATCHING Complete the following using the terms listed. -A(n) _____ is an executive responsible for managing a firm's information system and related computer technologies.

(Multiple Choice)
4.9/5
(37)

Jose purchases a new game for his computer. He loads the program onto the computer's hard drive. Jose has purchased a(n) ________.

(Multiple Choice)
4.8/5
(38)

Broxton, an information technology manager at Baron Inc., needs intranet in the new building that the company has purchased. Instead of spending money on wired network, Broxton decides that he will use a wireless intranet service. He needs intranet around 300-feet radius. Broxton can provide wireless intranet using _____ in the building.

(Multiple Choice)
4.8/5
(36)

Which of the following is a reason for the increasing popularity of notebook computers?

(Multiple Choice)
4.8/5
(35)

Provide the five important tasks for off-site data storage.

(Essay)
4.9/5
(33)

Define databases and describe how they are obtained and their uses.

(Essay)
4.9/5
(38)

All of the following devices are computer hardware EXCEPT a ________.

(Multiple Choice)
4.9/5
(36)

A virus can remain dormant for a period of time on a computer.

(True/False)
4.9/5
(32)
Showing 41 - 60 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)