Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business181 Questions
Exam 2: Business Ethics and Social Responsibility194 Questions
Exam 3: Economic Challenges Facing Contemporary Business220 Questions
Exam 4: Competing in World Markets200 Questions
Exam 5: Forms of Business Ownership and Organization190 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative148 Questions
Exam 7: Management, Leadership, and the Internal Organization202 Questions
Exam 8: Human Resource Management: From Recruitment to Labour Relations188 Questions
Exam 9: Top Performance Through Empowerment, Teamwork, and Communication189 Questions
Exam 10: Production and Operations Management203 Questions
Exam 11: Customer-Driven Marketing202 Questions
Exam 12: Product and Distribution Strategies222 Questions
Exam 13: Promotion and Pricing Strategies197 Questions
Exam 14: Using Technology to Manage Information155 Questions
Exam 15: Understanding Accounting and Financial Statements180 Questions
Exam 16: The Financial System200 Questions
Exam 17: Financial Management136 Questions
Select questions type
What is the difference between local area networks (LAN) and wide area networks (WAN)?
(Essay)
4.8/5
(25)
Application software controls the basic workings of a computer system.
(True/False)
4.7/5
(45)
Describe the types of crises that information systems are vulnerable to.
(Essay)
4.8/5
(38)
Credit card applications are often evaluated using expert systems.
(True/False)
4.9/5
(32)
All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n) ______.
(Multiple Choice)
4.9/5
(35)
Technology has advanced so quickly but small businesses do NOT have access to information that can make them competitive in a global arena.
(True/False)
4.9/5
(38)
List and briefly explain the most widely used business applications of computers.
(Essay)
4.8/5
(32)
All of the following devices are computer hardware EXCEPT a ______.
(Multiple Choice)
4.7/5
(43)
Deciding how to prevent system failures along with the ability to continue operating if computer systems fail is called ______.
(Multiple Choice)
4.9/5
(35)
Complete the following using the terms listed below.
-A secure connection between two points on the Internet is known as a(n) ______.
(Multiple Choice)
4.8/5
(34)
Briefly explain information systems and their significance within an organization.
(Essay)
4.8/5
(38)
Explain computer-based information systems and list their components and technologies.
(Essay)
4.8/5
(47)
Carmen is sitting at her computer analyzing the financial impact on an increase in her company's sales growth rate. Carmen is probably using a ______ program.
(Multiple Choice)
4.8/5
(34)
Grid computing is too expensive for small- to medium-sized companies.
(True/False)
4.8/5
(36)
Complete the following using the terms listed below.
-Telephones connected via ______ use personal computers with broadband connections in place of a traditional phone jack.
(Multiple Choice)
4.7/5
(35)
Showing 101 - 120 of 155
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)