Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business181 Questions
Exam 2: Business Ethics and Social Responsibility194 Questions
Exam 3: Economic Challenges Facing Contemporary Business220 Questions
Exam 4: Competing in World Markets200 Questions
Exam 5: Forms of Business Ownership and Organization190 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative148 Questions
Exam 7: Management, Leadership, and the Internal Organization202 Questions
Exam 8: Human Resource Management: From Recruitment to Labour Relations188 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication189 Questions
Exam 10: Production and Operations Management203 Questions
Exam 11: Customer-Driven Marketing202 Questions
Exam 12: Product and Distribution Strategies222 Questions
Exam 13: Promotion and Pricing Strategies197 Questions
Exam 14: Using Technology to Manage Information155 Questions
Exam 15: Understanding Accounting and Financial Statements180 Questions
Exam 16: The Financial System200 Questions
Exam 17: Financial Management136 Questions
Select questions type
Information overload is more of a problem today because of improved technology.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
Complete the following using the terms listed below.
-Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as ______.
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
I
Sean is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Sean used the firm's ______ system.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
In recent times, several companies-and nations-integrate high-tech and low-tech solutions to manage the flow of information. Which of the following has NOT been totally replaced?
(Multiple Choice)
4.8/5
(41)
An intranet is a type of security system for computers that limits data transfers to certain locations.
(True/False)
4.8/5
(33)
The person who directs a firm's management information systems and related computer operations is often called the ______.
(Multiple Choice)
4.9/5
(35)
______ tie geographic regions together using long-distance telephone lines or satellite transmissions.
(Multiple Choice)
4.7/5
(32)
Provide examples of ethical concerns regarding technology and information systems.
(Essay)
5.0/5
(29)
Complete the following using the terms listed below.
-A company network that links employees via Internet tools is called a(n) ______.
(Multiple Choice)
4.7/5
(27)
Decision support systems provide support to people making business decisions.
(True/False)
4.8/5
(41)
Transaction processing systems and process control systems are examples of operational support systems.
(True/False)
4.8/5
(32)
Complete the following using the terms listed below.
-A computer network that connects machines within a limited area is called a(n) ______.
(Multiple Choice)
4.8/5
(27)
Complete the following using the terms listed below.
-A(n) ______ is an executive responsible for managing a firm's information system and related computer technologies.
(Multiple Choice)
4.8/5
(32)
A program that attaches itself to other programs and changes programs or destroys data is a(n) ______.
(Multiple Choice)
4.8/5
(40)
Megan, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Megan uses a(n) ______.
(Multiple Choice)
4.9/5
(31)
Unlike viruses, worms don't need host programs to damage computer systems.
(True/False)
4.8/5
(35)
With VoIPs, if your broadband connection goes out, so will your phone service.
(True/False)
4.8/5
(24)
Complete the following using the terms listed below.
-A(n) ______ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 155
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)