Exam 15: Managing Information and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A virtual company has no significant physical presence.

(True/False)
4.9/5
(38)

Data mining is the process of searching and analyzing large amounts of data to reveal patterns and trends that can be used to predict future behavior.

(True/False)
4.8/5
(31)

How does an Internet cookie work

(Essay)
4.7/5
(34)

When encryption is used, data are scrambled using a complex code that can only be unlocked by a(n) _____.

(Multiple Choice)
4.7/5
(31)

The chief executive officer (CEO) of your company is very busy and demands relevant, timely, easily understood information to monitor the company's performance. The CEO also wants to be able to "drill down" to retrieve more detailed information on a particular activity. What type of system would the executive use

(Multiple Choice)
4.8/5
(42)

The chief information officer is in charge of collecting appropriate data.

(True/False)
4.8/5
(45)

SCENARIO-BASED Just about everybody is familiar with the amazing success that eBay has enjoyed during the last few years. It’s spawned eBay stores across the country, and executives plan to roll out more creative business practices in the near future. -eBay uses the Internet to _____.

(Multiple Choice)
4.9/5
(38)

Those entering organizations with information systems degrees may choose to follow a(n) _____.

(Multiple Choice)
4.8/5
(43)

_____ consists of data that have been processed or turned into some useful form.

(Multiple Choice)
4.9/5
(40)

If you were to replace the word "cloud" with another word it would be ________.

(Multiple Choice)
4.9/5
(40)

A thirdparty firm may supply a private system called a(n) _____ network, over which it may conduct a variety of transactions.

(Multiple Choice)
4.8/5
(33)

Using a variety of wired and wireless communication channels, data communication networks transmit digital data from one computer to another.

(True/False)
4.8/5
(41)

Of the following, only ____ data are considered internal data.

(Multiple Choice)
4.8/5
(35)

An intranet is a software program that controls access to a company's files.

(True/False)
4.7/5
(43)

Your own computer monitors your Internet activities and keeps track of the _____ that you access.

(Multiple Choice)
4.9/5
(37)

As a means of committing cyber crime, _____ are particularly dangerous because they can copy themselves over and over again.

(Multiple Choice)
4.9/5
(32)

SCENARIO-BASED Just about everybody is familiar with the amazing success that eBay has enjoyed during the last few years. It’s spawned eBay stores across the country, and executives plan to roll out more creative business practices in the near future. -The type of business practiced by eBay is best characterized as _____.

(Multiple Choice)
4.9/5
(34)

A thrift-added network is a private system set up by a third-party firm so that it can conduct a variety of transactions.

(True/False)
5.0/5
(38)

Your company owns a number of race-tracks around the country. You're trying to decide whether you should build a new track in Fargo, North Dakota. You want to be sure your company can afford to expand and there's sufficient demand for a race-track in Fargo. What type of management support system would you use for this type of decision

(Multiple Choice)
4.7/5
(42)

SCENARIO-BASED Consuela Alvarez is an information system (IS) manager for Metro Hospital, a major medical facility specializing in the care of infants and children. She supervises a total of ten people in processing the hospital’s information needs. She works long hours and always receives an “excellent” rating from upper management. Alvarez has worked for Metro in this capacity for six years and is quite happy with her job. -Despite her experience, the status of chief information officer is not actually on Alvarez's career path.

(True/False)
4.9/5
(31)
Showing 101 - 120 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)