Deck 4: Technological Environment

Full screen (f)
exit full mode
Question
When the value of a product depends on the number of users this is referred to as which of the following?

A) base of user phenomenon
B) user factor
C) snowball effect
D) network effects
Use Space or
up arrow
down arrow
to flip the card.
Question
A process that involves designing the evolution of technology to achieve a desired-end state is referred to as which of the following?

A) technology planning
B) technology forecasting
C) technology projections
D) technology budgeting
Question
What differentiates knowledge work from other types of work?

A) knowing how to access information
B) non-routine problem solving
C) creative problem solving
D) ability to use technology
Question
An employee who captures, codifies, and transfers knowledge across organizations for competitive advantage is referred to as which of the following?

A) information technician
B) traffic manager
C) knowledge worker
D) technology specialist
Question
Technology provides many advantages to individuals and businesses. Technology can be used to carry out routine, mundane functions as well as create which of the following?

A) algorithms
B) innovation
C) a database
D) efficiencies
Question
Which of the following changed the way that products are ordered, inventoried, and sold?

A) the scanner
B) the bar code
C) GPS
D) radio frequency tags
Question
Which of the following is NOT one of the activities that businesses monitor through technology?

A) worker productivity
B) email
C) production schedules
D) daily sales
Question
Which of the following contributes to and benefits from information used in performing various tasks including acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions?

A) information technicians
B) knowledge workers
C) knowledge shareholders
D) information monitors
Question
What is hardware or software designed to prevent unauthorized access to or from a private network?

A) brickwall
B) cyberwall
C) firewall
D) encrypted wall
Question
Which term describes most of the information used to make decisions in business?

A) inaccessible
B) protected
C) confidential
D) proprietary
Question
The responsibility of managing all information resources, computer systems and processes belongs to which of the following?

A) chief computer officer
B) chief systems officer
C) chief technology officer
D) chief information officer
Question
Which of the following is one of the most important roles that automated accounting functions are used for?

A) knowing how much is owed to the company
B) keeping up with accounts payable
C) tracking employees absences
D) monitoring revenues and expenses
Question
Technology planning involves evaluating which of the following about a company and then choosing the right technology to reach them?

A) budget numbers
B) strategic targets
C) industry benchmarks
D) goals and objectives
Question
Businesses can minimize overhead by getting rid of the "brick" and moving to which of the following?

A) offsite storage
B) just-in-time inventory
C) the click
D) radio frequency tags
Question
Which of the following is a term used to describe a formal transfer of rights to use technology from the developer to another party?

A) copyright shift
B) patent transfer
C) technology transfer
D) technology substitution
Question
Who does the CIO report directly to?

A) vice-president
B) chief executive officer
C) shareholders
D) board of directors
Question
What role does a CIO serve in an organization?

A) a middle-level manager who develops information for strategic planners
B) a middle-level manager responsible for providing information to answer "what-if" questions
C) an operational manager responsible for all information retrieval
D) a top manager who is responsible for all information resources in the organization
Question
Which of the following refers to the practical application of knowledge?

A) a transaction system
B) smartphone apps
C) a data-processing system
D) technology
Question
In technology planning, which aspects must businesses consider?

A) financial
B) strategic
C) human
D) competitive
Question
Canada has shifted from an industrial society to which of the following types of economy?

A) manufacturing-based
B) knowledge-based
C) export-based
D) trading-based
Question
Technology transfer is typically protected by trademarks.
Question
Technology offers many advantages, whether to perform mundane functions or to spur innovation.
Question
What do we call copying of software programs by people who haven't paid for them?

A) unfair access
B) technological turnover
C) software shrinkage
D) software piracy
Question
Technology transfer is a formal transfer of rights to use technology from the developer to another party.
Question
Network effects exist when the value of a product depends on the number of users.
Question
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, what types of issues are software companies addressing?

A) software piracy
B) software shrinkage
C) technological turnover
D) unfair access
Question
Businesses can minimize overhead by getting rid of the "brick" and moving to the click.
Question
Many companies have hired a chief information officer (CIO) to be responsible for managing all information resources.
Question
Most of the information used to make decisions in business is proprietary.
Question
Technology planning involves evaluating the company's goals and objectives and choosing the right technology to reach them.
Question
One of the most important roles of an automated accounting process is it allows a company to monitor how much tax it will owe the government.
Question
A knowledge worker is an employee who captures, codifies, and transfers knowledge across organizations for competitive advantage.
Question
Different technology systems can cause a big problem in which area of business?

A) between supplier and buyer
B) branch offices in different countries
C) mergers and acquisitions
D) schools and businesses selling to them
Question
Social media allows small businesses with niche markets to expand and have which of the following?

A) a global presence
B) a younger customer
C) more market penetration
D) increased exposure
Question
E-commerce companies like Amazon, Shop.ca, and Alibaba are classified as which of the following?

A) channel disruptors
B) deep discounters
C) intermediaries
D) cyberfirms
Question
According to your text, what are two of the three IT trends that are having the greatest impact on the IT environment?

A) privacy issues and on-demand computing
B) social media and online retailing
C) digital forensics and privacy issues
D) grid computing and on-demand computing
Question
Which of the following is NOT one of the three trends that are relevant to business today?

A) social media
B) online retailing
C) unpredictable evolution of technology
D) texting
Question
Technology has allowed individuals to save time and keep us informed and connected.
Question
Which of the following is a big advantage that technology brings for some employees?

A) virtual meetings
B) flex hours
C) telecommuting
D) video streaming of daycare
Question
Canada has shifted from an industrial society to an export-based economy.
Question
What is one of the most important roles of an automated accounting process?
Question
What does the statement, "Today most of us are knowledge workers," mean?
Question
Telecommuting is a big advantage that technology brings for employees but only certain companies allow it.
Question
Amazon, Shop.ca, and Alibaba are called channel disruptors.
Question
Describe three trends relevant to business today.
Question
What are the responsibilities of a CIO?
Question
What does the term "network effects" describe?
Question
What is information technology (IT)?
Question
Different technology systems can cause a problem in which aspect of businesses?
Question
Hardware or software designed to prevent unauthorized access to or from a private network is referred to as a brickwall.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Technological Environment
1
When the value of a product depends on the number of users this is referred to as which of the following?

A) base of user phenomenon
B) user factor
C) snowball effect
D) network effects
D
2
A process that involves designing the evolution of technology to achieve a desired-end state is referred to as which of the following?

A) technology planning
B) technology forecasting
C) technology projections
D) technology budgeting
A
3
What differentiates knowledge work from other types of work?

A) knowing how to access information
B) non-routine problem solving
C) creative problem solving
D) ability to use technology
B
4
An employee who captures, codifies, and transfers knowledge across organizations for competitive advantage is referred to as which of the following?

A) information technician
B) traffic manager
C) knowledge worker
D) technology specialist
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Technology provides many advantages to individuals and businesses. Technology can be used to carry out routine, mundane functions as well as create which of the following?

A) algorithms
B) innovation
C) a database
D) efficiencies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following changed the way that products are ordered, inventoried, and sold?

A) the scanner
B) the bar code
C) GPS
D) radio frequency tags
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT one of the activities that businesses monitor through technology?

A) worker productivity
B) email
C) production schedules
D) daily sales
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following contributes to and benefits from information used in performing various tasks including acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions?

A) information technicians
B) knowledge workers
C) knowledge shareholders
D) information monitors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What is hardware or software designed to prevent unauthorized access to or from a private network?

A) brickwall
B) cyberwall
C) firewall
D) encrypted wall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which term describes most of the information used to make decisions in business?

A) inaccessible
B) protected
C) confidential
D) proprietary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The responsibility of managing all information resources, computer systems and processes belongs to which of the following?

A) chief computer officer
B) chief systems officer
C) chief technology officer
D) chief information officer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is one of the most important roles that automated accounting functions are used for?

A) knowing how much is owed to the company
B) keeping up with accounts payable
C) tracking employees absences
D) monitoring revenues and expenses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Technology planning involves evaluating which of the following about a company and then choosing the right technology to reach them?

A) budget numbers
B) strategic targets
C) industry benchmarks
D) goals and objectives
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Businesses can minimize overhead by getting rid of the "brick" and moving to which of the following?

A) offsite storage
B) just-in-time inventory
C) the click
D) radio frequency tags
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a term used to describe a formal transfer of rights to use technology from the developer to another party?

A) copyright shift
B) patent transfer
C) technology transfer
D) technology substitution
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Who does the CIO report directly to?

A) vice-president
B) chief executive officer
C) shareholders
D) board of directors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What role does a CIO serve in an organization?

A) a middle-level manager who develops information for strategic planners
B) a middle-level manager responsible for providing information to answer "what-if" questions
C) an operational manager responsible for all information retrieval
D) a top manager who is responsible for all information resources in the organization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following refers to the practical application of knowledge?

A) a transaction system
B) smartphone apps
C) a data-processing system
D) technology
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In technology planning, which aspects must businesses consider?

A) financial
B) strategic
C) human
D) competitive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Canada has shifted from an industrial society to which of the following types of economy?

A) manufacturing-based
B) knowledge-based
C) export-based
D) trading-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Technology transfer is typically protected by trademarks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Technology offers many advantages, whether to perform mundane functions or to spur innovation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
What do we call copying of software programs by people who haven't paid for them?

A) unfair access
B) technological turnover
C) software shrinkage
D) software piracy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Technology transfer is a formal transfer of rights to use technology from the developer to another party.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Network effects exist when the value of a product depends on the number of users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, what types of issues are software companies addressing?

A) software piracy
B) software shrinkage
C) technological turnover
D) unfair access
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Businesses can minimize overhead by getting rid of the "brick" and moving to the click.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Many companies have hired a chief information officer (CIO) to be responsible for managing all information resources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Most of the information used to make decisions in business is proprietary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Technology planning involves evaluating the company's goals and objectives and choosing the right technology to reach them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
One of the most important roles of an automated accounting process is it allows a company to monitor how much tax it will owe the government.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A knowledge worker is an employee who captures, codifies, and transfers knowledge across organizations for competitive advantage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Different technology systems can cause a big problem in which area of business?

A) between supplier and buyer
B) branch offices in different countries
C) mergers and acquisitions
D) schools and businesses selling to them
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Social media allows small businesses with niche markets to expand and have which of the following?

A) a global presence
B) a younger customer
C) more market penetration
D) increased exposure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
E-commerce companies like Amazon, Shop.ca, and Alibaba are classified as which of the following?

A) channel disruptors
B) deep discounters
C) intermediaries
D) cyberfirms
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
According to your text, what are two of the three IT trends that are having the greatest impact on the IT environment?

A) privacy issues and on-demand computing
B) social media and online retailing
C) digital forensics and privacy issues
D) grid computing and on-demand computing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT one of the three trends that are relevant to business today?

A) social media
B) online retailing
C) unpredictable evolution of technology
D) texting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Technology has allowed individuals to save time and keep us informed and connected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a big advantage that technology brings for some employees?

A) virtual meetings
B) flex hours
C) telecommuting
D) video streaming of daycare
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Canada has shifted from an industrial society to an export-based economy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is one of the most important roles of an automated accounting process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What does the statement, "Today most of us are knowledge workers," mean?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Telecommuting is a big advantage that technology brings for employees but only certain companies allow it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Amazon, Shop.ca, and Alibaba are called channel disruptors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe three trends relevant to business today.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are the responsibilities of a CIO?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What does the term "network effects" describe?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is information technology (IT)?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Different technology systems can cause a problem in which aspect of businesses?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Hardware or software designed to prevent unauthorized access to or from a private network is referred to as a brickwall.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.