Deck 4: Technological Environment

ملء الشاشة (f)
exit full mode
سؤال
When the value of a product depends on the number of users this is referred to as which of the following?

A) base of user phenomenon
B) user factor
C) snowball effect
D) network effects
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A process that involves designing the evolution of technology to achieve a desired-end state is referred to as which of the following?

A) technology planning
B) technology forecasting
C) technology projections
D) technology budgeting
سؤال
What differentiates knowledge work from other types of work?

A) knowing how to access information
B) non-routine problem solving
C) creative problem solving
D) ability to use technology
سؤال
An employee who captures, codifies, and transfers knowledge across organizations for competitive advantage is referred to as which of the following?

A) information technician
B) traffic manager
C) knowledge worker
D) technology specialist
سؤال
Technology provides many advantages to individuals and businesses. Technology can be used to carry out routine, mundane functions as well as create which of the following?

A) algorithms
B) innovation
C) a database
D) efficiencies
سؤال
Which of the following changed the way that products are ordered, inventoried, and sold?

A) the scanner
B) the bar code
C) GPS
D) radio frequency tags
سؤال
Which of the following is NOT one of the activities that businesses monitor through technology?

A) worker productivity
B) email
C) production schedules
D) daily sales
سؤال
Which of the following contributes to and benefits from information used in performing various tasks including acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions?

A) information technicians
B) knowledge workers
C) knowledge shareholders
D) information monitors
سؤال
What is hardware or software designed to prevent unauthorized access to or from a private network?

A) brickwall
B) cyberwall
C) firewall
D) encrypted wall
سؤال
Which term describes most of the information used to make decisions in business?

A) inaccessible
B) protected
C) confidential
D) proprietary
سؤال
The responsibility of managing all information resources, computer systems and processes belongs to which of the following?

A) chief computer officer
B) chief systems officer
C) chief technology officer
D) chief information officer
سؤال
Which of the following is one of the most important roles that automated accounting functions are used for?

A) knowing how much is owed to the company
B) keeping up with accounts payable
C) tracking employees absences
D) monitoring revenues and expenses
سؤال
Technology planning involves evaluating which of the following about a company and then choosing the right technology to reach them?

A) budget numbers
B) strategic targets
C) industry benchmarks
D) goals and objectives
سؤال
Businesses can minimize overhead by getting rid of the "brick" and moving to which of the following?

A) offsite storage
B) just-in-time inventory
C) the click
D) radio frequency tags
سؤال
Which of the following is a term used to describe a formal transfer of rights to use technology from the developer to another party?

A) copyright shift
B) patent transfer
C) technology transfer
D) technology substitution
سؤال
Who does the CIO report directly to?

A) vice-president
B) chief executive officer
C) shareholders
D) board of directors
سؤال
What role does a CIO serve in an organization?

A) a middle-level manager who develops information for strategic planners
B) a middle-level manager responsible for providing information to answer "what-if" questions
C) an operational manager responsible for all information retrieval
D) a top manager who is responsible for all information resources in the organization
سؤال
Which of the following refers to the practical application of knowledge?

A) a transaction system
B) smartphone apps
C) a data-processing system
D) technology
سؤال
In technology planning, which aspects must businesses consider?

A) financial
B) strategic
C) human
D) competitive
سؤال
Canada has shifted from an industrial society to which of the following types of economy?

A) manufacturing-based
B) knowledge-based
C) export-based
D) trading-based
سؤال
Technology transfer is typically protected by trademarks.
سؤال
Technology offers many advantages, whether to perform mundane functions or to spur innovation.
سؤال
What do we call copying of software programs by people who haven't paid for them?

A) unfair access
B) technological turnover
C) software shrinkage
D) software piracy
سؤال
Technology transfer is a formal transfer of rights to use technology from the developer to another party.
سؤال
Network effects exist when the value of a product depends on the number of users.
سؤال
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, what types of issues are software companies addressing?

A) software piracy
B) software shrinkage
C) technological turnover
D) unfair access
سؤال
Businesses can minimize overhead by getting rid of the "brick" and moving to the click.
سؤال
Many companies have hired a chief information officer (CIO) to be responsible for managing all information resources.
سؤال
Most of the information used to make decisions in business is proprietary.
سؤال
Technology planning involves evaluating the company's goals and objectives and choosing the right technology to reach them.
سؤال
One of the most important roles of an automated accounting process is it allows a company to monitor how much tax it will owe the government.
سؤال
A knowledge worker is an employee who captures, codifies, and transfers knowledge across organizations for competitive advantage.
سؤال
Different technology systems can cause a big problem in which area of business?

A) between supplier and buyer
B) branch offices in different countries
C) mergers and acquisitions
D) schools and businesses selling to them
سؤال
Social media allows small businesses with niche markets to expand and have which of the following?

A) a global presence
B) a younger customer
C) more market penetration
D) increased exposure
سؤال
E-commerce companies like Amazon, Shop.ca, and Alibaba are classified as which of the following?

A) channel disruptors
B) deep discounters
C) intermediaries
D) cyberfirms
سؤال
According to your text, what are two of the three IT trends that are having the greatest impact on the IT environment?

A) privacy issues and on-demand computing
B) social media and online retailing
C) digital forensics and privacy issues
D) grid computing and on-demand computing
سؤال
Which of the following is NOT one of the three trends that are relevant to business today?

A) social media
B) online retailing
C) unpredictable evolution of technology
D) texting
سؤال
Technology has allowed individuals to save time and keep us informed and connected.
سؤال
Which of the following is a big advantage that technology brings for some employees?

A) virtual meetings
B) flex hours
C) telecommuting
D) video streaming of daycare
سؤال
Canada has shifted from an industrial society to an export-based economy.
سؤال
What is one of the most important roles of an automated accounting process?
سؤال
What does the statement, "Today most of us are knowledge workers," mean?
سؤال
Telecommuting is a big advantage that technology brings for employees but only certain companies allow it.
سؤال
Amazon, Shop.ca, and Alibaba are called channel disruptors.
سؤال
Describe three trends relevant to business today.
سؤال
What are the responsibilities of a CIO?
سؤال
What does the term "network effects" describe?
سؤال
What is information technology (IT)?
سؤال
Different technology systems can cause a problem in which aspect of businesses?
سؤال
Hardware or software designed to prevent unauthorized access to or from a private network is referred to as a brickwall.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Technological Environment
1
When the value of a product depends on the number of users this is referred to as which of the following?

A) base of user phenomenon
B) user factor
C) snowball effect
D) network effects
D
2
A process that involves designing the evolution of technology to achieve a desired-end state is referred to as which of the following?

A) technology planning
B) technology forecasting
C) technology projections
D) technology budgeting
A
3
What differentiates knowledge work from other types of work?

A) knowing how to access information
B) non-routine problem solving
C) creative problem solving
D) ability to use technology
B
4
An employee who captures, codifies, and transfers knowledge across organizations for competitive advantage is referred to as which of the following?

A) information technician
B) traffic manager
C) knowledge worker
D) technology specialist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Technology provides many advantages to individuals and businesses. Technology can be used to carry out routine, mundane functions as well as create which of the following?

A) algorithms
B) innovation
C) a database
D) efficiencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following changed the way that products are ordered, inventoried, and sold?

A) the scanner
B) the bar code
C) GPS
D) radio frequency tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is NOT one of the activities that businesses monitor through technology?

A) worker productivity
B) email
C) production schedules
D) daily sales
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following contributes to and benefits from information used in performing various tasks including acquiring, searching, analyzing, organizing, storing, programming, producing, distributing, marketing, or selling functions?

A) information technicians
B) knowledge workers
C) knowledge shareholders
D) information monitors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is hardware or software designed to prevent unauthorized access to or from a private network?

A) brickwall
B) cyberwall
C) firewall
D) encrypted wall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which term describes most of the information used to make decisions in business?

A) inaccessible
B) protected
C) confidential
D) proprietary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The responsibility of managing all information resources, computer systems and processes belongs to which of the following?

A) chief computer officer
B) chief systems officer
C) chief technology officer
D) chief information officer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is one of the most important roles that automated accounting functions are used for?

A) knowing how much is owed to the company
B) keeping up with accounts payable
C) tracking employees absences
D) monitoring revenues and expenses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Technology planning involves evaluating which of the following about a company and then choosing the right technology to reach them?

A) budget numbers
B) strategic targets
C) industry benchmarks
D) goals and objectives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Businesses can minimize overhead by getting rid of the "brick" and moving to which of the following?

A) offsite storage
B) just-in-time inventory
C) the click
D) radio frequency tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is a term used to describe a formal transfer of rights to use technology from the developer to another party?

A) copyright shift
B) patent transfer
C) technology transfer
D) technology substitution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Who does the CIO report directly to?

A) vice-president
B) chief executive officer
C) shareholders
D) board of directors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What role does a CIO serve in an organization?

A) a middle-level manager who develops information for strategic planners
B) a middle-level manager responsible for providing information to answer "what-if" questions
C) an operational manager responsible for all information retrieval
D) a top manager who is responsible for all information resources in the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following refers to the practical application of knowledge?

A) a transaction system
B) smartphone apps
C) a data-processing system
D) technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
In technology planning, which aspects must businesses consider?

A) financial
B) strategic
C) human
D) competitive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Canada has shifted from an industrial society to which of the following types of economy?

A) manufacturing-based
B) knowledge-based
C) export-based
D) trading-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Technology transfer is typically protected by trademarks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Technology offers many advantages, whether to perform mundane functions or to spur innovation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What do we call copying of software programs by people who haven't paid for them?

A) unfair access
B) technological turnover
C) software shrinkage
D) software piracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Technology transfer is a formal transfer of rights to use technology from the developer to another party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Network effects exist when the value of a product depends on the number of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, what types of issues are software companies addressing?

A) software piracy
B) software shrinkage
C) technological turnover
D) unfair access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Businesses can minimize overhead by getting rid of the "brick" and moving to the click.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Many companies have hired a chief information officer (CIO) to be responsible for managing all information resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Most of the information used to make decisions in business is proprietary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Technology planning involves evaluating the company's goals and objectives and choosing the right technology to reach them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
One of the most important roles of an automated accounting process is it allows a company to monitor how much tax it will owe the government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A knowledge worker is an employee who captures, codifies, and transfers knowledge across organizations for competitive advantage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Different technology systems can cause a big problem in which area of business?

A) between supplier and buyer
B) branch offices in different countries
C) mergers and acquisitions
D) schools and businesses selling to them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Social media allows small businesses with niche markets to expand and have which of the following?

A) a global presence
B) a younger customer
C) more market penetration
D) increased exposure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
E-commerce companies like Amazon, Shop.ca, and Alibaba are classified as which of the following?

A) channel disruptors
B) deep discounters
C) intermediaries
D) cyberfirms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
According to your text, what are two of the three IT trends that are having the greatest impact on the IT environment?

A) privacy issues and on-demand computing
B) social media and online retailing
C) digital forensics and privacy issues
D) grid computing and on-demand computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is NOT one of the three trends that are relevant to business today?

A) social media
B) online retailing
C) unpredictable evolution of technology
D) texting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Technology has allowed individuals to save time and keep us informed and connected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is a big advantage that technology brings for some employees?

A) virtual meetings
B) flex hours
C) telecommuting
D) video streaming of daycare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Canada has shifted from an industrial society to an export-based economy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is one of the most important roles of an automated accounting process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What does the statement, "Today most of us are knowledge workers," mean?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Telecommuting is a big advantage that technology brings for employees but only certain companies allow it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Amazon, Shop.ca, and Alibaba are called channel disruptors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe three trends relevant to business today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the responsibilities of a CIO?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What does the term "network effects" describe?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is information technology (IT)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Different technology systems can cause a problem in which aspect of businesses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Hardware or software designed to prevent unauthorized access to or from a private network is referred to as a brickwall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.