Exam 1: Managers: Key to Information Technology Results
Exam 1: Managers: Key to Information Technology Results79 Questions
Exam 2: Strategic Planning58 Questions
Exam 3: Project Management79 Questions
Exam 4: Business Process and It Outsourcing73 Questions
Exam 5: Corporate and It Governance78 Questions
Exam 6: Collaboration Tools79 Questions
Exam 7: E-Commerce79 Questions
Exam 8: Enterprise Systems80 Questions
Exam 9: Business Intelligence and Big Data80 Questions
Exam 10: Knowledge Management80 Questions
Exam 11: Cybercrime and It Security80 Questions
Exam 12: Ethical, legal, and Social Issues of Information Technology80 Questions
Select questions type
Usefulness,ease of use,management expectations,and facilitating conditions are the key factors of:
(Multiple Choice)
4.9/5
(36)
When a new information technology is introduced,managers are highly encouraged to adopt the technology first and then try to figure out its implications.
(True/False)
5.0/5
(33)
Which of the following is a phase of the Change Management Continuum Model?
(Multiple Choice)
4.9/5
(36)
Data assets must be secured from unwanted intrusion,loss,and alteration.This is to:
(Multiple Choice)
4.9/5
(38)
The Change Management Continuum Model,the Unified Theory of Acceptance and Use of Technology,and the Diffusion of Innovation Theory are the theories that can help:
(Multiple Choice)
4.8/5
(27)
Which of the following requires that all reports filed with the Securities and Exchange Commission (SEC)include a statement signed by the chief executive officer and the chief financial officer attesting the accuracy of the information provided in the reports?
(Multiple Choice)
4.8/5
(44)
An organization has to submit an audit to prove that it has accurate information on their assets.This is done to be in accordance to the:
(Multiple Choice)
4.8/5
(36)
Identify the stage in the Change Management Continuum Model that incorporates the changes in the routine operating procedures of an organization.
(Multiple Choice)
4.7/5
(37)
Which of the following adopter categories is considered as risk takers?
(Multiple Choice)
4.7/5
(34)
Which of the following information technologies (IT)include information systems that improve the productivity of individual users in performing stand-alone tasks?
(Multiple Choice)
4.8/5
(39)
Discuss the Diffusion of Innovation theory.What is the difference between an innovator and a laggard?
(Essay)
5.0/5
(42)
Which of the following uses information technology to conduct meetings or presentations via the Internet?
(Multiple Choice)
4.9/5
(31)
VisualDX provides instant access to concise disease information and high-quality medical images.This is an example of:
(Multiple Choice)
4.9/5
(37)
Which of the following is true of the Internalization phase of the Change Management Continuum Model?
(Multiple Choice)
4.7/5
(36)
Successful implementation of enterprise information technology system requires:
(Multiple Choice)
5.0/5
(40)
The _____ provides a roadmap to guide the management actions at each stage of the introduction of a new system.
(Multiple Choice)
4.9/5
(34)
Hypermedia,podcasts,and Webcasts are the techniques used in:
(Multiple Choice)
4.9/5
(33)
Which of the following best describes an enterprise system?
(Multiple Choice)
4.9/5
(45)
Employees of Jackshay Corp.misuse their time by viewing online shopping Web sites that is unrelated to their job.This leads to:
(Multiple Choice)
4.9/5
(35)
Hackers carry out a denial-of-service attack on an organization's Web site.This leads to the:
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 79
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)