Exam 14: Using Technology to Manage Information
Exam 1: The Changing Face of Business150 Questions
Exam 2: Business Ethics and Social Responsibility165 Questions
Exam 3: Economic Challenges Facing Todays Business165 Questions
Exam 4: Competing in World Markets158 Questions
Exam 5: Forms of Business Ownership and Organization149 Questions
Exam 6: Starting Your Own Business: the Entrepreneurship Alternative129 Questions
Exam 7: Management,leadership,and the Internal Organization165 Questions
Exam 8: Human Resource Management: From Recruitment to Labor Relations148 Questions
Exam 9: Top Performance Through Empowerment, teamwork, and Communication144 Questions
Exam 10: Production and Operations Management159 Questions
Exam 11: Customer-Driven Marketing148 Questions
Exam 12: Product and Distribution Strategies165 Questions
Exam 13: Promotion and Pricing Strategies150 Questions
Exam 14: Using Technology to Manage Information135 Questions
Exam 15: Understanding Accounting and Financial Statements135 Questions
Exam 16: The Financial System155 Questions
Exam 17: Financial Management135 Questions
Exam 18: Trends in E-Commerce50 Questions
Select questions type
Ramon,a software engineer at Frensen Inc. ,needs to develop high-quality graphic illustrations for presentation at his next team meeting.In the context of application software,he must use _____ software to accomplish this.
(Multiple Choice)
4.9/5
(34)
Which of the following involves the process of identifying,capturing,evaluating,retrieving,and sharing all of a company's databases,documents,policies,procedures,and previously un-captured expertise and experience of individual workers?
(Multiple Choice)
4.9/5
(37)
Ron is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Ron used the company's ________ system.
(Multiple Choice)
4.8/5
(33)
Complete the following using the terms listed.
-A centralized integrated collection of data resources is known as a(n)_____.
(Multiple Choice)
4.9/5
(32)
_____ refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze.
(Multiple Choice)
4.9/5
(43)
In the context of security and ethical issues affecting information system,theft of equipment is a type of malware.
(True/False)
4.8/5
(37)
An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.
(True/False)
4.8/5
(34)
Which of the following everyday items has been replaced by the present smart phone?
(Multiple Choice)
4.9/5
(30)
Complete the following using the terms listed.
-The _____ of a company is an organized method for collecting,storing,and communicating past,present,and projected data on internal operations and external intelligence.
(Multiple Choice)
4.8/5
(39)
Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called ________.
(Multiple Choice)
4.8/5
(34)
Complete the following using the terms listed.
-The purpose of a(n)_____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
(Multiple Choice)
4.8/5
(42)
All Walmart stores have satellite dishes that link stores together with the company's headquarters.Walmart is using a(n)________.
(Multiple Choice)
4.8/5
(32)
Showing 81 - 100 of 135
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)