Deck 13: Information Technology for Business

ملء الشاشة (f)
exit full mode
سؤال
Mass-customization is a flexible production process that generates customized products one at a time for lower prices than competitors.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Mass-customization allows a producer to build products according to customer specifications.
سؤال
More than 500 million computers in over 300 countries make up the Internet.
سؤال
Electronic conferencing systems connect members of a group for shared e-mail distribution, electronic meetings, appointments, and group writing.
سؤال
Both the Internet and the Web are considered to be the world's most powerful technologies.
سؤال
Improving in-stock reliability is the top priority for Wal-Mart's information system.
سؤال
The illegal use of software does not amount to nearly as much as the damage spam causes in lost time and lost productivity.
سؤال
Newsgroups often fall prey to spam.
سؤال
The Internet and the Web are _____.

A) videoconferencing systems
B) data communication networks
C) information exchanges
D) data meters
سؤال
The _____ is a standardized code for accessing information and transmitting data over the Internet.

A) Arpanet
B) Web
C) Internet Service Network
D) Federal Information Exchange
سؤال
Which statement is true regarding a client/server network?

A) Servers can be assigned to specific tasks.
B) Users can share resources and Internet connections.
C) Networks can be classified according to geographic scope.
D) All of the above statements are true.
سؤال
John's identity was stolen. He had assumed it had been done by a hacker before realizing that crooks also get information by ____.

A) digging in trash
B) intercepting phone messages
C) stealing mail
D) all of the above
سؤال
Which of the following best describes enterprise resource planning?

A) an information processing application for routine business activities of a company's business units
B) a large information system for integrating all the activities of a company's business units
C) a system used for transforming data into information for use in decision making
D) a computer-based electronic technology that assists in designing products by simulating a real product and displaying it in three-dimensional graphics
سؤال
Where is Wi-Fi, or wireless fidelity service, most likely to be found?

A) airport terminals
B) coffee shops
C) hotels
D) at any of these "hotspots"
سؤال
A management information system is _____.

A) a system that supports managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions
B) an easy-access application of an information system designed for instant access by upper-level managers
C) an information processing application for use in business activities involving well-defined processing steps
D) an interactive system that locates and presents information needed to support the decision-making process
سؤال
Which of the following best describes a decision support system?

A) a system that supports an organization's managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions
B) a quick-reference, easy-access application of information systems specifically designed for instant access by upper-level managers
C) a system of hardware and software that imitates human behavior
D) an interactive system that locates and presents information needed to support the decision-making process
سؤال
_____ is the fastest growing crime in the United States.

A) Phishing and pharming
B) Wireless mooching
C) Identity theft
D) Car-jacking
سؤال
NCR, the company that created the cash register, is now the leading manufacturer of _____.

A) stereo equipment
B) network servers
C) automatic teller machines
D) televisions
سؤال
Networks and technology are leading to _____.

A) leaner companies with fewer employees
B) simpler structures
C) greater customer satisfaction
D) all of the above
سؤال
Information technology is improving _____.

A) big businesses
B) small businesses
C) start-up businesses
D) all of the above
سؤال
Wal-Mart regards its information as a private resource. What is meant by "private resource"?

A) an asset that will decrease in value
B) an asset not intended for anyone's benefit
C) as asset that is planned, developed, and protected
D) as asset with limited applicability
سؤال
Wal-Mart uses _____ to sift through incoming information.

A) the Internet
B) communication technologies
C) networks
D) all of the above
سؤال
Through data mining, managers can _____.

A) plan for new products
B) set prices
C) identify shopping patterns
D) all of the above
سؤال
Through data mining, Wal-Mart can _____.

A) forecast sales
B) conduct merchandise planning
C) determine the effects of marketing promotions
D) all of the above
سؤال
A manager's information needs vary according to his or her _____.

A) personality
B) management level only
C) functional area only
D) management level and functional area
سؤال
The Commerce Department estimates that illegal product usage in the global market is costing U.S. companies _____ annually.

A) $500 million
B) $50 billion
C) $200 billion
D) $500 billion
سؤال
Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be _____.

A) an attempt to attach spyware to her computer
B) spam
C) a Trojan horse
D) any of the above
سؤال
According to the text, it is estimated that spam damage in lost time and productivity in the United States amounts to more than _____ annually.

A) $100 million
B) $1 billion
C) $9 billion
D) $150 billion
سؤال
What is a drawback for purchasing any of dozens of anti-spyware products?

A) They are often prohibitively expensive.
B) They require continual updates.
C) They are difficult to install.
D) They often don't work.
سؤال
How does the Internet connect the world?
سؤال
How might cultural differences among people impact the effectiveness of videoconferencing?
سؤال
How might cultural differences among people affect an information system?
سؤال
How might the use of a foreign language sometimes protect electronic communications users?
سؤال
An RFID code is assigned to each item when it is manufactured. What information is contained in the code?
سؤال
How does RFID compare with today's bar-coding scanning?
سؤال
Why will it take many years for Wal-Mart, for example, to fully implement RFID?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/36
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Information Technology for Business
1
Mass-customization is a flexible production process that generates customized products one at a time for lower prices than competitors.
False
2
Mass-customization allows a producer to build products according to customer specifications.
True
3
More than 500 million computers in over 300 countries make up the Internet.
False
4
Electronic conferencing systems connect members of a group for shared e-mail distribution, electronic meetings, appointments, and group writing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
5
Both the Internet and the Web are considered to be the world's most powerful technologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
6
Improving in-stock reliability is the top priority for Wal-Mart's information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
7
The illegal use of software does not amount to nearly as much as the damage spam causes in lost time and lost productivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
8
Newsgroups often fall prey to spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
9
The Internet and the Web are _____.

A) videoconferencing systems
B) data communication networks
C) information exchanges
D) data meters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
10
The _____ is a standardized code for accessing information and transmitting data over the Internet.

A) Arpanet
B) Web
C) Internet Service Network
D) Federal Information Exchange
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which statement is true regarding a client/server network?

A) Servers can be assigned to specific tasks.
B) Users can share resources and Internet connections.
C) Networks can be classified according to geographic scope.
D) All of the above statements are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
12
John's identity was stolen. He had assumed it had been done by a hacker before realizing that crooks also get information by ____.

A) digging in trash
B) intercepting phone messages
C) stealing mail
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following best describes enterprise resource planning?

A) an information processing application for routine business activities of a company's business units
B) a large information system for integrating all the activities of a company's business units
C) a system used for transforming data into information for use in decision making
D) a computer-based electronic technology that assists in designing products by simulating a real product and displaying it in three-dimensional graphics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
14
Where is Wi-Fi, or wireless fidelity service, most likely to be found?

A) airport terminals
B) coffee shops
C) hotels
D) at any of these "hotspots"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
15
A management information system is _____.

A) a system that supports managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions
B) an easy-access application of an information system designed for instant access by upper-level managers
C) an information processing application for use in business activities involving well-defined processing steps
D) an interactive system that locates and presents information needed to support the decision-making process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following best describes a decision support system?

A) a system that supports an organization's managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions
B) a quick-reference, easy-access application of information systems specifically designed for instant access by upper-level managers
C) a system of hardware and software that imitates human behavior
D) an interactive system that locates and presents information needed to support the decision-making process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
17
_____ is the fastest growing crime in the United States.

A) Phishing and pharming
B) Wireless mooching
C) Identity theft
D) Car-jacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
18
NCR, the company that created the cash register, is now the leading manufacturer of _____.

A) stereo equipment
B) network servers
C) automatic teller machines
D) televisions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
19
Networks and technology are leading to _____.

A) leaner companies with fewer employees
B) simpler structures
C) greater customer satisfaction
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
20
Information technology is improving _____.

A) big businesses
B) small businesses
C) start-up businesses
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
21
Wal-Mart regards its information as a private resource. What is meant by "private resource"?

A) an asset that will decrease in value
B) an asset not intended for anyone's benefit
C) as asset that is planned, developed, and protected
D) as asset with limited applicability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
22
Wal-Mart uses _____ to sift through incoming information.

A) the Internet
B) communication technologies
C) networks
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
23
Through data mining, managers can _____.

A) plan for new products
B) set prices
C) identify shopping patterns
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
24
Through data mining, Wal-Mart can _____.

A) forecast sales
B) conduct merchandise planning
C) determine the effects of marketing promotions
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
25
A manager's information needs vary according to his or her _____.

A) personality
B) management level only
C) functional area only
D) management level and functional area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
26
The Commerce Department estimates that illegal product usage in the global market is costing U.S. companies _____ annually.

A) $500 million
B) $50 billion
C) $200 billion
D) $500 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
27
Sally received an e-mail message that offered her free software to help her count calories. This e-mail message could be _____.

A) an attempt to attach spyware to her computer
B) spam
C) a Trojan horse
D) any of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
28
According to the text, it is estimated that spam damage in lost time and productivity in the United States amounts to more than _____ annually.

A) $100 million
B) $1 billion
C) $9 billion
D) $150 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is a drawback for purchasing any of dozens of anti-spyware products?

A) They are often prohibitively expensive.
B) They require continual updates.
C) They are difficult to install.
D) They often don't work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
30
How does the Internet connect the world?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
31
How might cultural differences among people impact the effectiveness of videoconferencing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
32
How might cultural differences among people affect an information system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
33
How might the use of a foreign language sometimes protect electronic communications users?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
34
An RFID code is assigned to each item when it is manufactured. What information is contained in the code?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
35
How does RFID compare with today's bar-coding scanning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
36
Why will it take many years for Wal-Mart, for example, to fully implement RFID?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.