Filters
Question type

Study Flashcards

Mark, a sales rep with a large technology company, is celebrating today because he just closed a large deal, which means a sizeable commission. Even the finance department is thrilled because Mark used ________ to review the credit history of this customer to be sure the deal would be a profitable one for the company.


A) knowledge transfer
B) business intelligence
C) data processing
D) business process information

Correct Answer

verifed

verified

Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.

Correct Answer

verifed

verified

A company can use a(n) ________ to prevent unauthorized outsiders from accessing information on its intranet.


A) firewall
B) disconnector
C) entry sentry
D) tripwire

Correct Answer

verifed

verified

________ technology uses a continuous Internet connection that allows users to send and receive mammoth files that include voice, video, and data much faster than ever before.


A) Widebeam
B) Least resistance
C) Analog
D) Broadband

Correct Answer

verifed

verified

There are three types of cloud computing: private clouds, public clouds, and hybrid clouds.

Correct Answer

verifed

verified

Which of the following observations would be the strongest evidence that Marshall Manufacturing has adopted knowledge technology?


A) Marshall's customers can place orders for its products directly from the company's Internet website.
B) Marshall has installed software that searches a variety of databases online for information relevant to each employee's current assignment, and sends the information to the appropriate employee's e-mail address.
C) Marshall has provided all of its employees with a personal computer.
D) Marshall has initiated a program that allows each employee to sign up for advanced training in the use of spreadsheets, word processors, graphics programs, and other types of software.

Correct Answer

verifed

verified

Bennett just got started using a storage method called Dropbox. He stores most of his information with this service. Bennett is using cloud computing.

Correct Answer

verifed

verified

The amount of information managers receive each day


A) is never enough; when it comes to managerial decision making, there is no such thing as too much information.
B) has been managed much more efficiently in recent years, largely due to the development of spreadsheets.
C) has remained remarkably stable over the years.
D) has become so great that it now threatens to bury many decision makers in infoglut.

Correct Answer

verifed

verified

The use of knowledge technology should result in a(n)


A) greater reliance on mainframe computers.
B) increase in the number of firms using spreadsheet software.
C) reduction in the amount of time managers spend searching for relevant information.
D) taller organization as firms hire more information specialists to handle the increased flow of information.

Correct Answer

verifed

verified

Studies have shown that all types of workers are likely to become more productive when they are allowed to telecommute.

Correct Answer

verifed

verified

Relevance is one of the key characteristics of useful information.

Correct Answer

verifed

verified

The primary role of business technology during the 1970s was to


A) empower workers by giving them access to ever-greater amounts of information.
B) implement new production methods that relied on automated equipment.
C) protect proprietary company information from outsiders.
D) support existing business by improving the flow of financial information.

Correct Answer

verifed

verified

Data mining looks for previously unknown relationships among vast amounts of data.

Correct Answer

verifed

verified

A firm would be most likely to establish an enterprise portal if it wanted to


A) prevent outsiders from using its information network.
B) allow users to access different areas of its network depending on their relationship to the firm.
C) prevent viruses from being downloaded from the company's website.
D) search for hidden patterns and unknown relationships among data stored in different information systems.

Correct Answer

verifed

verified

Fran is shopping online for jeans and she clicks on a style she likes. The site quickly presents her with a close-up view and additional information that will help her make a decision. When she adds the jeans to her shopping bag, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Fran and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called


A) social media.
B) cookie mining.
C) Web 2.0.
D) Web 3.0.

Correct Answer

verifed

verified

Phishing is an online security threat in which scammers hold data hostage until you pay the hacker to get it back.

Correct Answer

verifed

verified

The key distinction between data and information is that data


A) are facts and figures that have been stored in databases so that they can be accessed and manipulated by a computer while information has not been.
B) is less reliable than information because its accuracy has not been verified.
C) is mathematical in nature while information is verbal in nature.
D) are raw, unanalyzed facts and figures while information is data that has been processed and summarized so that is can be used by decision makers.

Correct Answer

verifed

verified

Brianna, a marketing manager for a chain of clothing stores, recently received an e-mail with some timely and reliable information about trends in men's clothing for next season. Unfortunately, her store sells only women's clothes. The information in the newsletter was not useful to Brianna because it lacked


A) redundancy.
B) accuracy.
C) relevance.
D) selectivity.

Correct Answer

verifed

verified

A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establishing a(n)


A) extranet.
B) innernet.
C) enternet.
D) intranet.

Correct Answer

verifed

verified

The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.

Correct Answer

verifed

verified

Showing 141 - 160 of 192

Related Exams

Show Answer