Filters
Question type

Study Flashcards

Edwin, a sales manager, just finished reading some sales statistics comparing his company's performance to that of competitors. The statistics summarize a mass of raw figures into a few meaningful measures that Edwin will use to determine whether he needs to change his sales strategy. The statistics in the printout are


A) information, while the raw figures used to compute the statistics are data.
B) data, while the raw figures used to compute the statistics are information.
C) less useful to Edwin than the raw figures would have been, since summarizing the figures necessarily reduces their accuracy.
D) an example of how managers have a tendency to oversimplify by reducing complex issues into a few simple numbers.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

When ransomware holds your data hostage, what is most likely to happen?


A) Hackers will demand you pay them to get your files back.
B) Hackers permanently delete specific files.
C) Hackers publicly share your personal information on social media.
D) Hackers wipe your computer clean and leave it useless.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.

A) True
B) False

Correct Answer

verifed

verified

The use of antivirus software completely eliminates the risk of downloading infected files.

A) True
B) False

Correct Answer

verifed

verified

Jeff's bank recently contacted him to tell him someone illegally accessed the bank's computer system and gained access to information about customer account numbers and PIN numbers. The bank is recommending Jeff and other customers change their account numbers and access numbers for security reasons. The bank and Jeff are victims of a


A) net crasher.
B) software pirate.
C) slammer.
D) hacker.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

In the 1970s, business technology was known as


A) data processing.
B) information processing.
C) information technology.
D) systems analysis.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Most e-mail messages are automatically encrypted to protect them from being intercepted and read by hackers.

A) True
B) False

Correct Answer

verifed

verified

It is illegal for companies to scan e-mails written by their employees at work unless the employees have given permission in advance or the firm has received approval from a federal judge.

A) True
B) False

Correct Answer

verifed

verified

________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.


A) Information processing
B) Data processing
C) Artificial intelligence
D) Business intelligence

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

One of the most revolutionary impacts computer technology has had on business has been to


A) allow employees of organizations to do much of their work at home and on the road.
B) increase the number of layers of management.
C) replace human creativity with artificial creativity.
D) make it easier for businesses to keep proprietary information safe and secure.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an advantage of telecommuting?


A) Workers are not included in the office loop.
B) People who work at home have less trouble letting go of work and relaxing when the workday is over.
C) Telecommuting increases travel time and costs.
D) Firms may be able to retain workers who would otherwise leave or retire by allowing them to work at home.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

High-quality information is


A) accurate and reliable.
B) normative and open ended.
C) simple and easy to use.
D) subjective and unique.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Bandwidth is the term used to describe the rate at which data flows through the Internet.

A) True
B) False

Correct Answer

verifed

verified

A basic truth in management is that you can never have too much information.

A) True
B) False

Correct Answer

verifed

verified

Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.

A) True
B) False

Correct Answer

verifed

verified

The three types of cloud computing are


A) public, private, and personal clouds.
B) application, analytic, and informative clouds.
C) power, private, and virtual clouds.
D) public, private, and hybrid clouds.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Enterprise portals are simply web pages with links to company-specific products and services.

A) True
B) False

Correct Answer

verifed

verified

RFID devices collect biological data.

A) True
B) False

Correct Answer

verifed

verified

In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.

A) True
B) False

Correct Answer

verifed

verified

Showing 161 - 180 of 192

Related Exams

Show Answer