Management Bonus B 1 Data and information are two different names for essentially the same thing

subject Type Homework Help
subject Pages 14
subject Words 133
subject Authors James McHugh, Susan McHugh, William Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
1. Though the types of technology used by businesses have changed over the last several
decades, the role of business technology has remained remarkably constant.
2. In the 1970s business technology was known as data processing.
3. Data and information are two different names for essentially the same thing.
page-pf2
4. Information is data that has been processed and organized so that it can be used for
managerial decision making.
5. During the 1970s, the purpose of data processing was to support the existing business by
improving the flow of financial information.
6. During the 1970s business technology employees often dealt directly with customers.
page-pf3
7. During the 1980s, the role of business technology changed from supporting business to
doing business.
8. In the late 1980s and early 1990s, businesses began to emphasize finding ways to employ
new technologies to improve existing methods of doing business.
9. During the 1980s business technology began to emphasize the use of technology to
change how business was conducted by introducing new methods.
page-pf4
10. Today the role of the chief information officer is to help the business use technology to
communicate better with others while offering better service and lower costs.
11. In today's technological environment, the typical chief information officer (CIO) spends the
majority of his or her time overcoming glitches and making sure the organization's information
system is up and running.
12. Information technology brings work to people instead of requiring people to go to work.
page-pf5
13. Business intelligence (BI) changes the traditional flow of information so that the database
goes to the individual rather than the individual going to the database.
14. In the coming years, successful information management will be more concerned with
achieving and maintaining stability and predictability, and less concerned with adapting to
change.
15. Information technology has changed the staffing and customer relations of businesses.
page-pf6
16. Business intelligence is any variety of software applications that analyze an organization's
raw data and take useful insights from it.
17. Over time, business technology has become much more sophisticated, but its basic
application has remained to support the existing operations of businesses by providing key
financial information.
page-pf7
18. The experiences of the past several decades show that, while improvements in
technology frequently enhance the efficiency of basic business operations, such improvements
never actually change the fundamental way that businesses operate.
19. As businesses began using business intelligence, managers spent less time finding
information and more time using it to make decisions.
page-pf8
20. Katie Prescott's assistant just handed her a report that summarizes and organizes many
raw facts and figures into a few key measures that will help her judge whether her department is
meeting its key objectives. The summary measures included in the report are information, while
the raw facts and figures used to compute these measures are data.
21. Kent Uchi is the CIO for a major corporation. Kent's job will require him to have an
extensive knowledge of the hardware and software his company uses, but he will seldom be
concerned about the methods and procedures used by specific departments.
page-pf9
22. RFID devices collect biological data.
23. Public data includes electronic traces that people leave when posting to the Internet and
sending e-mail.
24. Your online shopping trail provides information that indicates your personal preferences.
page-pfa
25. A basic truth in management is that you can never have too much information.
26. In this age of technology, managers can easily become buried in information infoglut.
27. Useful information has three defining characteristics: (1) it is easily accessible, (2) it is
efficiently organized, and (3) it is simple to manipulate.
page-pfb
28. The quality of management information depends on its accuracy and reliability.
29. Timeliness is one of the characteristics of useful management information.
30. Subjectivity is one of the four characteristics of useful information.
page-pfc
31. Relevance is one of the key characteristics of useful information.
32. Redundancy is one of the four characteristics of useful information.
33. The first step in avoiding information overload is to identify four or five key goals and
focus only on information that is related to those goals.
page-pfd
34. Data mining looks for previously unknown relationships among vast amounts of data.
35. Major retail firms such as Walmart have used data mining to customize the product
offerings for each store.
36. The success of data mining depends on access to data.
page-pfe
37. The key to improving management decision making is to provide the manager with as
much information as possible.
38. In order for information to be useful to managers, it must satisfy only two criteria: it must
be timely, and it must be easy to manipulate.
page-pff
39. Manager Minnie Hope is overwhelmed by information overload. Unfortunately, in this day
of technology, there is little she can do to control this problem.
40. Penny Pinchers Discount is a major discount store chain in the Southwest. The company
wants to do a better job of finding sales patterns and trends that will help it customize the
product offerings for different stores. Data mining is one technique that would help Penny
Pinchers achieve this goal.
page-pf10
41. An intranet is a companywide network that is based on Internet technology, but closed to
public access.
42. Intranets use a different, less sophisticated, type of technology than the Internet.
43. The software or hardware barrier that a business uses to prevent unauthorized users from
gaining access to their intranet is known as a tripware.
page-pf11
44. Firewalls can be constructed using software, hardware, or a combination of both.
45. The most productive way for firms to use intranets is to publish information that can be
accessed by all employees within an organization.
46. Interactive intranet applications can save money and increase revenue by reducing paper
handling and enabling faster decision making.
page-pf12
47. The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary
new fiber optic technology that will enable computer users throughout the world to send and
receive data up to 256 times faster than they can using the Internet technology of the early
2010s.
48. A common use of an extranet is to extend an intranet to outside customers.
49. Compared to intranets, one advantage of an extranet is that it protects a company's
information from hackers.
page-pf13
50. One problem with most extranets is that they use public lines, which makes it possible for
hackers to get into the network.
51. Extranets now allow small firms to share and process data much as large firms have been
able to do using electronic data interchange.
52. Virtual private networks are quick and easy to set up, but they are less secure than
extranets.
page-pf14
53. Virtual private networks create secure connections over regular Internet lines.
54. A virtual private network allows information managers to simulate a real intranet in order
to identify possible security problems and technical glitches before the company sets up the
actual private network.
55. Enterprise portals are simply web pages with links to company-specific products and
services.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.