Chapter 15 Technology if Difficult Ref 152b key Information

subject Type Homework Help
subject Pages 3
subject Words 683
subject Authors Chuck Williams

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Course Pre-Assessment CH 15
Williams Effective Management 6e
MULTIPLE CHOICE
1. Why is information strategically important for organizations?
a.
Information can be used to obtain first-mover advantage.
b.
Information is derived from perceived knowledge, which limits its availability.
c.
Information cannot be used as a medium of exchange.
d.
Information creates suboptimization opportunities.
e.
All of these are examples of why information is strategically important for organizations.
2. A table showing the order frequencies as well as the average dollar value of the orders of different
segments of a catalog retailer's market would be an example of:
a.
an MIS
b.
perceived knowledge
c.
raw data
d.
information
e.
influential knowledge
3. The key to sustaining competitive advantage is:
a.
faster computers with more memory
b.
using information technology to continuously improve and support the core functions of a
business
c.
the Internet
d.
the ability of the managers to delegate
e.
how important the company's culture perceives conceptual skills
4. The two basic methods of capturing information are:
a.
systematic and unsystematic
b.
planned and unplanned
c.
continuous and intermittent
d.
functional and hierarchical
e.
manual and electronic
page-pf2
5. In the process of capturing information, ASCII text is generated by:
a.
bar codes
b.
electronic scanners
c.
optical character recognition software
d.
e-tools
e.
data mining
6. Data mining is the:
a.
automated, electronic capture of data
b.
process of hypothesis testing in large databases
c.
process of verifying known relationships in large amounts of data
d.
process of discovering unknown patterns and relationships in large amounts of data
e.
method used to identify and eliminate perishable data
7. Data clusters:
a.
result from the use of internal data mining
b.
are a statistical technique used for trend analysis
c.
are used to create samples for statistical analyses
d.
occur when three or more database elements occur together in a significant way
e.
are accurately described by all of these
8. Two critical steps are required to make sure that data can be accessed by authorized users and no one
else. They are:
a.
authentication and authorization
b.
authorization and empowerment
c.
delegation and empowerment
d.
encryption and empowerment
e.
authentication and encryption
9. The goal of an executive information system (EIS) is to:
a.
replace the need for intuition in decision making
b.
create a link among authorized data and network users
c.
protect organizational data from hackers
d.
provide accurate, complete, relevant, and timely information to managers
e.
do none of these
10. A(n) ____ is a private company network that allows employees to easily access, share, and publish
information using Internet software.
page-pf3
a.
LAN portal
b.
private company network (PCN)
c.
intranet
d.
electronic data sharing system
e.
information network
11. A(n) ____ uses internal and external sources of data to provide managers and executives the
information they need to monitor and analyze organizational performance.
a.
executive information system
b.
managerial information service
c.
expert system
d.
decision support system
e.
environmental information system
12. ____ is the direct electronic transmission of purchase and ordering information from one company's
computer system to another company's computer system.
a.
Automated processing
b.
Electronic data interchange
c.
Transaction channeling
d.
Data manipulation
e.
Information exchange
13. Which of the following statements about knowledge is true?
a.
Data and information are the same as knowledge.
b.
Knowledge resides in information.
c.
Knowledge is the understanding that one gains from information.
d.
Knowledge is easier to acquire than data and information.
e.
All of these statements about knowledge are true.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.