Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business181 Questions
Exam 2: Business Ethics and Social Responsibility194 Questions
Exam 3: Economic Challenges Facing Contemporary Business220 Questions
Exam 4: Competing in World Markets200 Questions
Exam 5: Forms of Business Ownership and Organization190 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative148 Questions
Exam 7: Management, Leadership, and the Internal Organization202 Questions
Exam 8: Human Resource Management: From Recruitment to Labour Relations188 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication189 Questions
Exam 10: Production and Operations Management203 Questions
Exam 11: Customer-Driven Marketing202 Questions
Exam 12: Product and Distribution Strategies222 Questions
Exam 13: Promotion and Pricing Strategies197 Questions
Exam 14: Using Technology to Manage Information155 Questions
Exam 15: Understanding Accounting and Financial Statements180 Questions
Exam 16: The Financial System200 Questions
Exam 17: Financial Management136 Questions
Select questions type
Despite improvement in technology in today's environment, specialized hand-held devices for various applications are NOT available to small businesses.
(True/False)
4.8/5
(26)
A firewall scrambles data, making it difficult for unauthorized users to view the data.
(True/False)
4.9/5
(35)
______ allow users to enter data and commands for processing, storage, and output.
(Multiple Choice)
4.8/5
(43)
A computer program that imitates human thinking is a(n) ______.
(Multiple Choice)
4.9/5
(35)
Complete the following using the terms listed below.
-______ uses powerful servers to store applications software and databases for users to access via the Web.
(Multiple Choice)
4.9/5
(30)
Which of the following is the most recent development in notebook computers?
(Multiple Choice)
4.9/5
(39)
______ is used for planning and preventing computer system failures, and planning how to continue operations if computer systems do fail.
(Multiple Choice)
4.7/5
(25)
As viruses become more complex, the technology to fight them has lagged behind.
(True/False)
4.9/5
(37)
A server supports applications and allows networked users to share output devices, software, and databases.
(True/False)
4.9/5
(38)
Disaster recovery planning involves deciding how to prevent system failures and continue operations if computer systems fail.
(True/False)
4.8/5
(33)
Complete the following using the terms listed below.
-______ software secretly gathers user information through the user's Internet connection without the user's knowledge.
(Multiple Choice)
4.9/5
(38)
Grid computing combines multiple small computers to create a virtual mainframe.
(True/False)
4.9/5
(46)
What is a decision support system? How does a decision support system differ from an expert system?
(Essay)
4.8/5
(34)
Hans works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Hans is using a(n) ______.
(Multiple Choice)
4.9/5
(32)
Caleb's company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Caleb's company has installed a(n) ______.
(Multiple Choice)
4.9/5
(39)
Complete the following using the terms listed below.
-A system that allows top managers to access a firm's primary databases is called a(n) ______.
(Multiple Choice)
4.7/5
(32)
Explain the difference between an intranet and a virtual private network.
(Essay)
4.7/5
(39)
One basic form of disaster prevention is routinely backing up software and data.
(True/False)
4.8/5
(35)
Showing 61 - 80 of 155
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)