Deck 7: Designing Organizational Structures
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/87
Play
Full screen (f)
Deck 7: Designing Organizational Structures
1
In the early 2000s business technology became known as information systems.
False
2
It is important for information provided to be relevant to the issue at hand.
True
3
Data mining looks for hidden patterns in the data in a data warehouse and discovers relationships among the data.
True
4
Technology eliminates layers of management.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
5
IT creates organizations and services that are independent of location.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
6
E-business refers to any electronic business data exchange using any electronic device.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
7
Data are the processed facts and figures that can be used for managerial decision making.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
8
In Internet retail,data mining is called shopping cart analysis.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
9
Data is raw,unanalyzed and unorganized facts and figures.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
10
Virtualization is accessibility through technology that allows business to be conducted anywhere at any time.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
11
The more information provided the better it is.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
12
Information usefulness is based on six characteristics.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
13
The phenomenon of reading papers and reports online is known as infoglut.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
14
A data warehouse stores data on a specific subject over a period of time.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
15
In the 1970s business technology was known as data processing.Its primary purpose was to improve the flow of financial information.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
16
A data warehouse contains historical paper-based information prior to scanning it for electronic storage.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
17
Instant messaging is not used in business; it is a personal communication tool.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
18
One disadvantage of technology is that it increases the number of corporate barriers.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
19
Quality of information means the information is accurate and reliable.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
20
The proper management of information is the core of most companies' business.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
21
Instability in technology may be caused by human error.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
22
Computers today are still susceptible to hackers.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
23
Wi-Fi is the technology used to obtain an Internet connection without having to connect to a phone line or cable line.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
24
An intranet is a companywide network,closed to public access that uses Internet-type technology.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
25
Shareware is copyrighted but distributed to potential customers free of charge.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
26
It is important to find the right software before finding the right hardware.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
27
A VPN allows a company to have privacy and security in its network.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
28
Cookies are pieces of information sent by a Web site over the Internet to your Web browser.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
29
Public domain software is software that is free for the taking.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
30
A gateway is an entry point into a Web site.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
31
The Wi-Fi available in Panera Bread allows users with wireless laptops to connect to the Web.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
32
A virtual private network is a private data network that creates secure connections or "tunnels" over regular Internet lines.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
33
To protect from viruses computer users should practice "safe computing".
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
34
All the information found online is reliable.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
35
Wireless networking has set the common PC free from cords.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
36
An encryption is a secret code given to information when it is passing through the Internet.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
37
An intranet consists of hardware and software that prevents outsiders from accessing information the user does not want others to see.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
38
Wireless networking refers to the technology used to obtain an Internet connection without having to connect to a phone line or cable line.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
39
An extranet is a semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
40
Computer viruses can often cause instability in technology.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
41
Hi-fi refers to the ability of a computer or device to transport signals through the air.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
42
__________ is the processed and organized data that can be used for managerial decision making.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
43
The phenomenon of information overload in business is called __________.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
44
In the 1990s the name given to business technology was __________.Its role became the way of doing business,rather than just using technology to help with business functions.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
45
__________ is accessibility through technology that allows business to be conducted anywhere at any time.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
46
Raw,unanalyzed and unorganized facts and figures are called __________.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
47
Most e-mail travels over the Internet in unencrypted plain text,meaning that the information can be viewed by anyone.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
48
A(n)__________ is a semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)__________ can consist of hardware or software and prevents outsiders from accessing information the user does not want others to see.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
50
A(n)__________ is a companywide network,closed to public access that uses Internet-type technology.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
51
Software that is copyrighted but distributed to potential customers free of charge is called __________.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
52
__________ are people who break into computer systems for illegal purposes.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
53
The name for business technology in the 1970s was __________.Its primary purpose was to improve the flow of financial information.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
54
Data __________ is looking for hidden patterns in the data in a data warehouse and discovering relationships among the data.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)__________ is a piece of programming code inserted into other programming to cause some unexpected and for the victim,usually undesirable,event.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
56
A(n)__________ stores data on a specific subject over a period of time.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
57
More than one-fourth of U.S.companies scan employee e-mail regularly and legally.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
58
E-mail is private and secure.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
59
Web sites often send __________ to your computer that stay on your hard drive.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
60
__________ is the name for the business technology of the 1980s.Its role changed from supporting the business to doing business.Technology such as ATMs and voice mail are examples.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
61
A(n)__________ prevents outsiders from accessing corporate information the user does not want others to see.
A) Intranet
B) Firewall
C) Extranet
D) Castlewall
A) Intranet
B) Firewall
C) Extranet
D) Castlewall
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
62
Usefulness is based on four characteristics: quality,completeness,timeliness and:
A) Accuracy
B) Lots of information
C) Quick retrieval
D) Relevance
A) Accuracy
B) Lots of information
C) Quick retrieval
D) Relevance
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
63
In the 1990s business technology then became known as:
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
64
A(n)__________ stores data on a specific subject over a period of time.
A) Data handler
B) Info handler
C) Info warehouse
D) Data warehouse
A) Data handler
B) Info handler
C) Info warehouse
D) Data warehouse
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
65
Blackberries or wireless laptop computers encourage __________ or independence of location.
A) Virtualization
B) Instant messaging
C) Wi-Fi
D) Viral marketing
A) Virtualization
B) Instant messaging
C) Wi-Fi
D) Viral marketing
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
66
Information overload in business is also called:
A) Infoglut
B) Infoquan
C) Infosum
D) Overinfo
A) Infoglut
B) Infoquan
C) Infosum
D) Overinfo
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
67
A(n)__________ is a companywide network closed to public access that uses Internet-type technology.
A) Extranet
B) Intranet
C) Companet
D) Firewall
A) Extranet
B) Intranet
C) Companet
D) Firewall
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
68
__________ looks for hidden patterns in the data in a data warehouse and discovers relationships among the data.
A) Data deciphering
B) Data patterning
C) Data mining
D) Data development
A) Data deciphering
B) Data patterning
C) Data mining
D) Data development
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
69
Just as phone companies provide secure shared resources for voice messages,__________ provide the same secure sharing of public resources for data.
A) VIPs
B) VPNs
C) EXNs
D) IMPs
A) VIPs
B) VPNs
C) EXNs
D) IMPs
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
70
__________ refers to the ability of a computer or device to transport signals through the air.
A) Wireless networking
B) Wireless fidelity
C) Wireless signaling
D) Flexible wiring
A) Wireless networking
B) Wireless fidelity
C) Wireless signaling
D) Flexible wiring
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
71
Hardware includes:
A) Computers
B) Pagers
C) IPods
D) All of the responses are correct
A) Computers
B) Pagers
C) IPods
D) All of the responses are correct
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
72
__________ is/are raw,unanalyzed and unorganized facts and figures.
A) Information
B) Spreadsheets
C) Data
D) Numeracy
A) Information
B) Spreadsheets
C) Data
D) Numeracy
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
73
In the 1980s business technology was known as:
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is an information technology challenge?
A) Governmental security
B) Security
C) Stability
D) All of the responses are correct
A) Governmental security
B) Security
C) Stability
D) All of the responses are correct
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
75
The advantage to IM in business is that:
A) It is immediate
B) There is no incremental cost
C) Business professionals can participate in multiple conversations at once
D) All of the responses are correct
A) It is immediate
B) There is no incremental cost
C) Business professionals can participate in multiple conversations at once
D) All of the responses are correct
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
76
The technology used to obtain an Internet connection without having to connect to a phone line or cable line is called:
A) Wireless networking
B) High-fidelity
C) Wireless fidelity
D) Free networking
A) Wireless networking
B) High-fidelity
C) Wireless fidelity
D) Free networking
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
77
In the 1970s business technology was known as:
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
A) Data processing
B) Information systems
C) Data analysis
D) Information technology
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
78
Programming codes inserted into other programming to cause unexpected events are called:
A) Viruses
B) Beetles
C) Phishes
D) Gorillas
A) Viruses
B) Beetles
C) Phishes
D) Gorillas
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
79
In Internet __________,data mining is called shopping cart analysis.
A) Manufacturing
B) Wholesaling
C) Retailing
D) Cooperatives
A) Manufacturing
B) Wholesaling
C) Retailing
D) Cooperatives
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
80
_________ is/are the processed and organized data that can be used for managerial decision making.
A) Data
B) Information
C) Knowledge
D) Intelligence
A) Data
B) Information
C) Knowledge
D) Intelligence
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck