Deck 22: Appendix: Using Technology to Manage Information

Full screen (f)
exit full mode
Question
Information technology brings work to people instead of requiring people to go to work.
Use Space or
up arrow
down arrow
to flip the card.
Question
During the 1970s business technology employees often dealt directly with customers.
Question
Data and information are two different names for essentially the same thing.
Question
The experiences of the past several decades show that, while improvements in technology frequently enhance the efficiency of basic business operations, such improvements never actually change the fundamental way that businesses operate.
Question
Information is data that has been processed and organized so that it can be used for managerial decision making.
Question
In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.
Question
In the 1970s business technology was known as data processing.
Question
Information technology has changed the staffing and customer relations of businesses.
Question
Today the role of the chief information officer is to help the business use technology to communicate better with others while offering better service and lower costs.
Question
Over time, business technology has become much more sophisticated, but its basic application has remained to support the existing operations of businesses by providing key financial information.
Question
During the 1980s, the role of business technology changed from supporting business to doing business.
Question
During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.
Question
As businesses began using business intelligence, managers spent less time finding information and more time using it to make decisions.
Question
In today's technological environment, the typical chief information officer (CIO) spends the majority of his or her time overcoming glitches and making sure the organization's information system is up and running.
Question
Business intelligence (BI) changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.
Question
Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.
Question
Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.
Question
In the late 1980s and early 1990s, businesses began to emphasize finding ways to employ new technologies to improve existing methods of doing business.
Question
During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.
Question
Business intelligence is any variety of software applications that analyze an organization's raw data and take useful insights from it.
Question
Redundancy is one of the four characteristics of useful information.
Question
Subjectivity is one of the four characteristics of useful information.
Question
A basic truth in management is that you can never have too much information.
Question
The success of data mining depends on access to data.
Question
Perfect Price Warehouse is a major discount store chain on the east coast. The company wants to do a better job of finding sales patterns and trends that will help it customize the product offerings for different stores. Data mining is one technique that would help Perfect Price Warehouse achieve this goal.
Question
Timeliness is one of the characteristics of useful management information.
Question
Data mining looks for previously unknown relationships among vast amounts of data.
Question
In this age of technology, managers can easily become buried in information infoglut.
Question
Ronald is the CIO for a major corporation. His job requires him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.
Question
RFID devices collect biological data.
Question
Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.
Question
Major retail firms such as Walmart have used data mining to customize the product offerings for each store.
Question
Useful information has three defining characteristics: (1) it is easily accessible, (2) it is efficiently organized, and (3) it is simple to manipulate.
Question
In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.
Question
Your online shopping trail provides information that indicates your personal preferences.
Question
The quality of management information depends on its accuracy and reliability.
Question
The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.
Question
Relevance is one of the key characteristics of useful information.
Question
The key to improving management decision making is to provide the manager with as much information as possible.
Question
Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.
Question
Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.
Question
Intranets use a different, less sophisticated, type of technology than the Internet.
Question
Internet2 runs more than 22,000 times faster than today's public infrastructure.
Question
A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.
Question
Firewalls can be constructed using software, hardware, or a combination of both.
Question
The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.
Question
The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.
Question
Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.
Question
Compared to intranets, one advantage of an extranet is that it protects a company's information from hackers.
Question
Interactive intranet applications can save money and increase revenue by reducing paper handling and enabling faster decision making.
Question
Virtual private networks create secure connections over regular Internet lines.
Question
A common use of an extranet is to extend an intranet to outside customers.
Question
Extranets now allow small firms to share and process data much as large firms have been able to do using electronic data interchange.
Question
Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.
Question
One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.
Question
The software or hardware barrier that a business uses to prevent unauthorized users from gaining access to their intranet is known as a tripware.
Question
An intranet is a companywide network that is based on Internet-type technology, but closed to public access.
Question
Enterprise portals are simply web pages with links to company-specific products and services.
Question
Virtual private networks are quick and easy to set up, but they are less secure than extranets.
Question
Bandwidth is the term used to describe the rate at which data flows through the Internet.
Question
The advantages of cloud computing are security, possible instability, and data control.
Question
Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.
Question
Bennett just got started using a storage method called Dropbox. He stores most of his information with this service. Bennett is using cloud computing.
Question
Tee Time Golf Resorts currently has an intranet, and is considering making use of an extranet. One of the main reasons Tee Time may want an extranet is to allow a select group of outside customers to have access to information on its intranet.
Question
The main reason for setting up an enterprise portal is to ensure that only employees of an organization have access to the information on its intranet.
Question
There are three types of cloud computing: private clouds, public clouds, and hybrid clouds.
Question
Some advantages of cloud computing include flexible capacity and easier access.
Question
The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.
Question
Users of Internet2 each pay the same fee for their connection and share bandwidth equally.
Question
Information managers at Epic Electronics want to provide a single, seamless interface that will make it easier for customers, suppliers, and employees to gain access to the parts of its intranet that they need. Epic could achieve this result by setting up an enterprise portal.
Question
Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.
Question
Internal networking shares the resources of all computers with each networked computer.
Question
Because cloud computing is often too expensive for small businesses, it is rarely used.
Question
A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.
Question
One of the most revolutionary effects of computer networks is that they give employees the ability to do much of their work at home.
Question
Telecommuting is popular with workers, but it is costly for businesses.
Question
Cloud computing is a form of virtualization in which a company's data and applications are stored onsite and accessed via an external hard drive.
Question
Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.
Question
The use of computers increases the number of layers of management, resulting in taller organizations.
Question
The main purpose of an intranet is to allow a company to keep in close contact with its customers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/192
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 22: Appendix: Using Technology to Manage Information
1
Information technology brings work to people instead of requiring people to go to work.
True
2
During the 1970s business technology employees often dealt directly with customers.
False
3
Data and information are two different names for essentially the same thing.
False
4
The experiences of the past several decades show that, while improvements in technology frequently enhance the efficiency of basic business operations, such improvements never actually change the fundamental way that businesses operate.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
5
Information is data that has been processed and organized so that it can be used for managerial decision making.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
6
In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
7
In the 1970s business technology was known as data processing.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
8
Information technology has changed the staffing and customer relations of businesses.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
9
Today the role of the chief information officer is to help the business use technology to communicate better with others while offering better service and lower costs.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
10
Over time, business technology has become much more sophisticated, but its basic application has remained to support the existing operations of businesses by providing key financial information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
11
During the 1980s, the role of business technology changed from supporting business to doing business.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
12
During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
13
As businesses began using business intelligence, managers spent less time finding information and more time using it to make decisions.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
14
In today's technological environment, the typical chief information officer (CIO) spends the majority of his or her time overcoming glitches and making sure the organization's information system is up and running.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
15
Business intelligence (BI) changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
16
Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
17
Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
18
In the late 1980s and early 1990s, businesses began to emphasize finding ways to employ new technologies to improve existing methods of doing business.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
19
During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
20
Business intelligence is any variety of software applications that analyze an organization's raw data and take useful insights from it.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
21
Redundancy is one of the four characteristics of useful information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
22
Subjectivity is one of the four characteristics of useful information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
23
A basic truth in management is that you can never have too much information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
24
The success of data mining depends on access to data.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
25
Perfect Price Warehouse is a major discount store chain on the east coast. The company wants to do a better job of finding sales patterns and trends that will help it customize the product offerings for different stores. Data mining is one technique that would help Perfect Price Warehouse achieve this goal.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
26
Timeliness is one of the characteristics of useful management information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
27
Data mining looks for previously unknown relationships among vast amounts of data.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
28
In this age of technology, managers can easily become buried in information infoglut.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
29
Ronald is the CIO for a major corporation. His job requires him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
30
RFID devices collect biological data.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
31
Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
32
Major retail firms such as Walmart have used data mining to customize the product offerings for each store.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
33
Useful information has three defining characteristics: (1) it is easily accessible, (2) it is efficiently organized, and (3) it is simple to manipulate.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
34
In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
35
Your online shopping trail provides information that indicates your personal preferences.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
36
The quality of management information depends on its accuracy and reliability.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
37
The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
38
Relevance is one of the key characteristics of useful information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
39
The key to improving management decision making is to provide the manager with as much information as possible.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
40
Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
41
Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
42
Intranets use a different, less sophisticated, type of technology than the Internet.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
43
Internet2 runs more than 22,000 times faster than today's public infrastructure.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
44
A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
45
Firewalls can be constructed using software, hardware, or a combination of both.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
46
The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
47
The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
48
Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
49
Compared to intranets, one advantage of an extranet is that it protects a company's information from hackers.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
50
Interactive intranet applications can save money and increase revenue by reducing paper handling and enabling faster decision making.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
51
Virtual private networks create secure connections over regular Internet lines.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
52
A common use of an extranet is to extend an intranet to outside customers.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
53
Extranets now allow small firms to share and process data much as large firms have been able to do using electronic data interchange.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
54
Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
55
One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
56
The software or hardware barrier that a business uses to prevent unauthorized users from gaining access to their intranet is known as a tripware.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
57
An intranet is a companywide network that is based on Internet-type technology, but closed to public access.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
58
Enterprise portals are simply web pages with links to company-specific products and services.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
59
Virtual private networks are quick and easy to set up, but they are less secure than extranets.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
60
Bandwidth is the term used to describe the rate at which data flows through the Internet.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
61
The advantages of cloud computing are security, possible instability, and data control.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
62
Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
63
Bennett just got started using a storage method called Dropbox. He stores most of his information with this service. Bennett is using cloud computing.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
64
Tee Time Golf Resorts currently has an intranet, and is considering making use of an extranet. One of the main reasons Tee Time may want an extranet is to allow a select group of outside customers to have access to information on its intranet.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
65
The main reason for setting up an enterprise portal is to ensure that only employees of an organization have access to the information on its intranet.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
66
There are three types of cloud computing: private clouds, public clouds, and hybrid clouds.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
67
Some advantages of cloud computing include flexible capacity and easier access.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
68
The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
69
Users of Internet2 each pay the same fee for their connection and share bandwidth equally.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
70
Information managers at Epic Electronics want to provide a single, seamless interface that will make it easier for customers, suppliers, and employees to gain access to the parts of its intranet that they need. Epic could achieve this result by setting up an enterprise portal.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
71
Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
72
Internal networking shares the resources of all computers with each networked computer.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
73
Because cloud computing is often too expensive for small businesses, it is rarely used.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
74
A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
75
One of the most revolutionary effects of computer networks is that they give employees the ability to do much of their work at home.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
76
Telecommuting is popular with workers, but it is costly for businesses.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
77
Cloud computing is a form of virtualization in which a company's data and applications are stored onsite and accessed via an external hard drive.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
78
Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
79
The use of computers increases the number of layers of management, resulting in taller organizations.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
80
The main purpose of an intranet is to allow a company to keep in close contact with its customers.
Unlock Deck
Unlock for access to all 192 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 192 flashcards in this deck.