Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business181 Questions
Exam 2: Business Ethics and Social Responsibility194 Questions
Exam 3: Economic Challenges Facing Contemporary Business220 Questions
Exam 4: Competing in World Markets200 Questions
Exam 5: Forms of Business Ownership and Organization190 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative148 Questions
Exam 7: Management, Leadership, and the Internal Organization202 Questions
Exam 8: Human Resource Management: From Recruitment to Labour Relations188 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication189 Questions
Exam 10: Production and Operations Management203 Questions
Exam 11: Customer-Driven Marketing202 Questions
Exam 12: Product and Distribution Strategies222 Questions
Exam 13: Promotion and Pricing Strategies197 Questions
Exam 14: Using Technology to Manage Information155 Questions
Exam 15: Understanding Accounting and Financial Statements180 Questions
Exam 16: The Financial System200 Questions
Exam 17: Financial Management136 Questions
Select questions type
For companies to gain increased security for Internet communications, which of the following networks are recommended?
(Multiple Choice)
4.8/5
(34)
Which of the following is a computer program that imitates human thinking by applying human knowledge in a specific subject area to solve a problem?
(Multiple Choice)
4.8/5
(36)
A firewall is a computer network that is similar to the Internet but limits access to authorized users.
(True/False)
4.8/5
(39)
Cloud computing allows users to access software and databases via an intranet.
(True/False)
4.9/5
(44)
What are the five important tasks that need to be considered by an organization regarding offsite data storage?
(Essay)
4.7/5
(36)
All of the following are reasonable responses to potential computer problems EXCEPT ______.
(Multiple Choice)
4.7/5
(30)
Briefly describe some of the ethical issues regarding information systems within an organization.
(Essay)
4.9/5
(38)
______ is a network of PCs that have been infected with one or more data-stealing viruses.
(Multiple Choice)
4.8/5
(42)
On-demand computing is particularly useful for companies that experience seasonal spikes in customer usage of their applications.
(True/False)
4.7/5
(36)
On-site data backup involves storing software and data in a separate physical location or online on the Internet.
(True/False)
4.7/5
(42)
Sales of notebook computers are now exceeding sales of desktop computers.
(True/False)
4.7/5
(36)
Which of the following factors are NOT part of the most significant trends in information systems?
(Multiple Choice)
4.8/5
(37)
Mario downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause was a(n) ______.
(Multiple Choice)
4.7/5
(33)
A familiar example of wide area networks is long-distance telephone service.
(True/False)
4.9/5
(36)
Today, ______ make information access and information transmission work very smoothly.
(Multiple Choice)
4.7/5
(41)
What are some ways that businesses can protect themselves from computer crimes?
(Essay)
4.8/5
(41)
Showing 21 - 40 of 155
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)