Exam 15: Managing Information and Technology
Exam 1: The Foundations of Business164 Questions
Exam 2: Business Ethics and Social Responsibility171 Questions
Exam 3: Business in a Global Environment161 Questions
Exam 4: Selecting a Form of Business Ownership149 Questions
Exam 5: The Challenges of Starting a Business155 Questions
Exam 6: Managing for Business Success156 Questions
Exam 7: Recruiting, Motivating, and Keeping Quality Employees162 Questions
Exam 8: Teamwork and Communications153 Questions
Exam 9: Marketing: Providing Value to Customers167 Questions
Exam 10: Product Design and Development154 Questions
Exam 11: Operations Management in Manufacturing and Service Industries150 Questions
Exam 12: The Role of Accounting in Business165 Questions
Exam 13: Managing Financial Resources165 Questions
Exam 14: Personal Finances148 Questions
Exam 15: Managing Information and Technology170 Questions
Exam 16: The Legal and Regulatory Environment of Business148 Questions
Select questions type
A computer-integrated manufacturing (CIM) system is a common element in a(an) _____ system, which makes it possible to change equipment setups by reprogramming computer-controlled machines.
(Multiple Choice)
4.8/5
(36)
A firm's _____ department will recruit, train, evaluate, and compensate its salespeople.
(Multiple Choice)
4.8/5
(40)
Information is unprocessed facts; data are information that has been processed.
(True/False)
4.7/5
(37)
Consisting of computers connected by telephone lines, wireless technology, or satellite, a(n) _____ network covers a relatively large geographical area.
(Multiple Choice)
4.7/5
(31)
A CIM system is a common element in a flexible manufacturing system.
(True/False)
4.9/5
(33)
Which of the following statements about data communication networks is false
(Multiple Choice)
4.9/5
(31)
Companies contract for various cloud computing services, including software as a service (SaaS). Which of the following statements is not true about this type of service
(Multiple Choice)
4.7/5
(31)
A _____ verifies the identity of a computer site and sends you a digital certificate of authenticity stating that it trusts that site.
(Multiple Choice)
4.8/5
(47)
Your online activities can be intercepted by a practice called privacy theft.
(True/False)
4.7/5
(32)
In addition to data that you supply willingly, information about you can be gathered online without your knowledge or consent by means of so-called _____.
(Multiple Choice)
4.8/5
(35)
To channel information to multiple users, many large and midsized companies rely on a highly integrated _____ system.
(Multiple Choice)
4.8/5
(37)
A transaction involves the application of technology to monitor and control physical processes.
(True/False)
4.9/5
(39)
SCENARIO-BASED
Just about everybody is familiar with the amazing success that eBay has enjoyed during the last few years. It’s spawned eBay stores across the country, and executives plan to roll out more creative business practices in the near future.
-In considering what to do about malicious programs, eBay managers will be concerned about all of the following except _____.
(Multiple Choice)
4.8/5
(48)
A firm's _____ department will report on customers' credit ratings and current sales prices.
(Multiple Choice)
4.9/5
(39)
By establishing itself as a _____ company, the CD Internet retailer Spun.com avoided carrying $8 million in inventory that it would otherwise have needed to support its sales.
(Multiple Choice)
5.0/5
(31)
Caesar's primary data source is internal-generated by the company itself rather than provided by outside sources.
(True/False)
5.0/5
(35)
A company's transaction processing system processes both financial and non-financial transactions. Which of the following is a non-financial transaction
(Multiple Choice)
4.9/5
(37)
Showing 61 - 80 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)