Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information overload is more of a problem today because of improved technology.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

Complete the following using the terms listed below. -Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as ______.

Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
Verified

I

Sean is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Sean used the firm's ______ system.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

In recent times, several companies-and nations-integrate high-tech and low-tech solutions to manage the flow of information. Which of the following has NOT been totally replaced?

(Multiple Choice)
4.8/5
(41)

Explain on-demand computing.

(Essay)
4.8/5
(39)

An intranet is a type of security system for computers that limits data transfers to certain locations.

(True/False)
4.8/5
(33)

The person who directs a firm's management information systems and related computer operations is often called the ______.

(Multiple Choice)
4.9/5
(35)

An expert system would most likely be used to ______.

(Multiple Choice)
4.8/5
(40)

______ tie geographic regions together using long-distance telephone lines or satellite transmissions.

(Multiple Choice)
4.7/5
(32)

Provide examples of ethical concerns regarding technology and information systems.

(Essay)
5.0/5
(29)

Complete the following using the terms listed below. -A company network that links employees via Internet tools is called a(n) ______.

(Multiple Choice)
4.7/5
(27)

Decision support systems provide support to people making business decisions.

(True/False)
4.8/5
(41)

Transaction processing systems and process control systems are examples of operational support systems.

(True/False)
4.8/5
(32)

Complete the following using the terms listed below. -A computer network that connects machines within a limited area is called a(n) ______.

(Multiple Choice)
4.8/5
(27)

Complete the following using the terms listed below. -A(n) ______ is an executive responsible for managing a firm's information system and related computer technologies.

(Multiple Choice)
4.8/5
(32)

A program that attaches itself to other programs and changes programs or destroys data is a(n) ______.

(Multiple Choice)
4.8/5
(40)

Megan, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Megan uses a(n) ______.

(Multiple Choice)
4.9/5
(31)

Unlike viruses, worms don't need host programs to damage computer systems.

(True/False)
4.8/5
(35)

With VoIPs, if your broadband connection goes out, so will your phone service.

(True/False)
4.8/5
(24)

Complete the following using the terms listed below. -A(n) ______ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.

(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 155
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)