Exam 15: Managing Information and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

As an information technology manager, Caroline Clayton often works with _____ control technology to monitor and control physical processes.

(Multiple Choice)
4.8/5
(37)

Many people fear that Internet _____, which can be valuable information to cyber criminals, are vulnerable to theft.

(Multiple Choice)
4.9/5
(33)

_____ software performs a specific task, such as word processing or spreadsheet creation.

(Multiple Choice)
4.8/5
(30)

A flexible manufacturing system extracts data from a database to compile sales analyses and other reports.

(True/False)
4.9/5
(33)

E-commerce is business conducted over the Internet.

(True/False)
4.7/5
(38)

The most commonly used encryption system for transmitting data over the Internet is called certificate authority.

(True/False)
4.8/5
(32)

How do businesses use decision support systems

(Essay)
4.7/5
(37)

The process control system used to tell if the meat in your supermarket is stored at the correct temperature is an example of a management support system.

(True/False)
4.9/5
(38)

Applications software performs particular tasks, whether word processing, spreadsheet management, or graphical design and presentation.

(True/False)
4.9/5
(43)

To gather and process data into information and distribute it to people who need it, organizations develop information systems.

(True/False)
4.8/5
(35)

The criminal device that can result in damage to personal computers is known as a _____.

(Multiple Choice)
4.8/5
(32)

The practice of installing _____ to keep fires that start in one part of a building from getting into another has a direct application in information technology.

(Multiple Choice)
4.9/5
(37)

It may help to know that, if you're asked to provide personal information online, the recipient of this information may _____ reveal it to anyone else.

(Multiple Choice)
4.8/5
(27)

Of the following, only ____ data are considered external data.

(Multiple Choice)
4.7/5
(38)

External data includes accounting data.

(True/False)
4.8/5
(42)

Client-server systems include a number of client machines and a server.

(True/False)
4.8/5
(40)

Encryption is the process of encoding data so that only individuals armed with a secret code can decode it.

(True/False)
4.7/5
(38)

A digital camera-surveillance system uses face-recognition technology.

(True/False)
4.7/5
(45)

You work for a company that manufactures and sells guitars. What type of computer system allows you and others in your organization to quickly find out whether a particular guitar is in stock, determine the expected delivery date, find out your customer's credit rating, and find the current selling price of the guitar

(Multiple Choice)
4.9/5
(40)

SCENARIO-BASED Consuela Alvarez is an information system (IS) manager for Metro Hospital, a major medical facility specializing in the care of infants and children. She supervises a total of ten people in processing the hospital’s information needs. She works long hours and always receives an “excellent” rating from upper management. Alvarez has worked for Metro in this capacity for six years and is quite happy with her job. -When Metro has finished installing computer programs that mimic the judgment of experts by following sets of rules that such experts would follow, it will have access to what's known as an expert system.

(True/False)
4.9/5
(35)
Showing 141 - 160 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)