Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business156 Questions
Exam 2: Business Ethics and Social Responsibility183 Questions
Exam 3: Economic Challenges Facing Contemporary Business179 Questions
Exam 4: Competing in World Markets171 Questions
Exam 5: Forms of Business Ownership and Organization164 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative111 Questions
Exam 7: Management, Leadership, and the Internal Organization194 Questions
Exam 8: Human Resource Management: From Recruitment to Labor Relations149 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication146 Questions
Exam 10: Production and Operations Management166 Questions
Exam 11: Customer-Driven Marketing156 Questions
Exam 12: Product and Distribution Strategies184 Questions
Exam 13: Promotion and Pricing Strategies157 Questions
Exam 14: Using Technology to Manage Information117 Questions
Exam 15: Understanding Accounting and Financial Statements136 Questions
Exam 16: The Financial System163 Questions
Exam 17: Financial Management99 Questions
Select questions type
Unlike viruses, worms don't need host programs to damage computer systems.
(True/False)
4.9/5
(35)
MATCHING
Complete the following using the terms listed.
-Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.
(Multiple Choice)
5.0/5
(32)
Cloud-computing services often make off-site backup more complicated.
(True/False)
4.8/5
(35)
MATCHING
Complete the following using the terms listed.
-_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
(Multiple Choice)
4.9/5
(33)
A program that attaches itself to other programs and changes programs or destroys data is a(n) ________.
(Multiple Choice)
4.9/5
(33)
MATCHING
Complete the following using the terms listed.
-_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
(Multiple Choice)
4.8/5
(35)
MATCHING
Complete the following using the terms listed.
-A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
(Multiple Choice)
4.7/5
(25)
Alberto purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, Alberto established a(n) ________ to create company bulletin boards, share documents, and conduct online conference.
(Multiple Choice)
4.8/5
(38)
Local area networks allow computers to share the same printers, documents, and information.
(True/False)
4.9/5
(38)
On Zaxen.com, homebuyers enter information regarding their preferred home location, price, and features. Using an ________, the website automatically displays real estate properties that match the homebuyer's criteria.
(Multiple Choice)
4.7/5
(28)
MATCHING
Complete the following using the terms listed.
-A computer network that connects machines within a limited area is called a(n) _____.
(Multiple Choice)
4.8/5
(32)
An especially powerful midrange computer is called a supercomputer.
(True/False)
4.9/5
(32)
Isabelle's office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Isabelle took no chances and implemented ________, in which she backed up her data in a secure online storage service.
(Multiple Choice)
4.8/5
(27)
Credit card applications are often evaluated using executive systems.
(True/False)
5.0/5
(32)
Showing 101 - 117 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)