MIS Exam #1

Helpfulness: 0
Set Details Share
created 4 years ago by Sarah_Whitty
16,582 views
updated 4 years ago by Sarah_Whitty
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:
1

_____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

  1. Business intelligence
  2. Business differentiation
  3. Business exploration
  4. Business indexing

A

2

The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.

  1. cache
  2. kernel
  3. process
  4. data

D

3

In designing a management information system (MIS), after defining the system's objectives, the next step is to _____.

  1. provide information in a useful format
  2. integrate the hardware and software components
  3. collect and analyze data
  4. use information for decision making

C

4

_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.

  1. Computer literacy
  2. Information literacy
  3. Business literacy
  4. Network literacy

A

5

A(n)__________, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.

  1. process
  2. Select
  3. object
  4. procedure
  5. database

E

6

_____ is understanding the role of information in generating and using business intelligence.

  1. Business ability
  2. Information retrieval
  3. Information literacy
  4. Business mastery

C

7

In the context of the major components of an information system, which of the following is a difference between information and data?

  1. Unlike data, information is considered the input to an information system.
  2. Unlike data, information by itself is difficult to use for making decisions.
  3. Unlike data, information consists of facts that have been analyzed by the process component.
  4. Unlike data, information can be collected in aggregated and disaggregated forms.

C

8

Database management systems _____.

  1. improve routing and delivery schedules of databases
  2. include transaction-processing reports for database analysis
  3. are used to create, organize, and manage databases
  4. are written for specific database applications

C

9

Which of the following statements is true of an intranet?

  1. It is a network where a computer is connected to the Internet and acts as a gateway for other devices.
  2. It is a widely available public network of interconnected computer networks.
  3. It is a network that covers a wide area with the help of rented telecommunication lines.
  4. It is a network within an organization that uses Internet protocols and technologies.

D

10

Which of the following decisions is supported by a logistics information system (LIS)?

  1. Minimizing capital investment risks
  2. Determining portfolio structures
  3. Predicting an organization's future personnel needs
  4. Selecting the best modes of transportation

D

11

Which of the following systems supports sales forecasting?

  1. Logistics information systems
  2. . Personnel information systems
  3. Financial information systems
  4. Marketing information systems

D

12

A__________is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.

  1. marketing information system
  2. personnel information system
  3. Select
  4. manufacturing information system
  5. logistics information system

E

13

A personnel information system (PIS) helps in _____.

  1. determining portfolio structures
  2. choosing the best job candidate
  3. calculating product costs
  4. improving transportation budgeting

B

14

_____ refers to building and integrating analytics capabilities into all everyday business activities.

  1. Pervasive analytics
  2. Artificial intelligence
  3. Business analytics
  4. Business intelligence

A

15

_____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture.

  1. Pervasive computing
  2. Context aware computing
  3. Ubiquitous computing
  4. Cloud computing

C

16

The__________is the heart of a computer.

  1. basic input/output system
  2. Select
  3. main memory
  4. serial port
  5. central processing unit (CPU)

E

17

Beginning in the 1940s, first-generation computers used _____.

  1. integrated circuits
  2. vacuum tube technology
  3. laser technology
  4. transistors

B

18

The breakthrough technology of the 1960s was to "print" electronic components onto silicon wafers, also known as _____.

  1. vacuum tube technology
  2. integrated circuits
  3. parallel processing
  4. optical discs

B

19

Computer designers are now working on technology using gallium arsenide instead of silicon because silicon:

  1. is soft and fragile.
  2. cannot emit light and has speed limitations
  3. is expensive.
  4. cannot be used for the mass production of electronic devices.

B

20

Which of the following is an example of an input device?

  1. A barcode reader
  2. An organic light-emitting diode
  3. An inkjet printer
  4. A cathode ray tube

A

21

What is necessary for a computer to accept a new type of data (like pictures, audio, or video) as input?

  1. an international standard of measurement must be agreed upon
  2. it must be compressed to less than four gigabytes (4GB)
  3. it must be possible to convert it into numbers
  4. it must be something human senses can perceive

C

22

What is the implication of the "GIGO" principle?

  1. computers have been doubling in processing power about every 18 months since the 1960s
  2. if we don't know how to do something, we can't teach a computer to do it
  3. computers will process any data you provide, but do not care if the data is accurate or the result is meaningful
  4. software can be divided into "system" and "application" categories

C

23

__________bits equal one byte.

  1. Eight
  2. Ten
  3. Sixty-four
  4. Thirty-two
  5. Six

A

24

A gigabyte (GB) is about 1 billion bytes. What's the next larger unit of data size (equal to about 1 trillion bytes)?

  1. kilobyte (KB)
  2. petabyte (PB)
  3. megabyte (MB)
  4. terabyte (TB)

D

25

A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.

  1. server
  2. cache
  3. array
  4. program

D

26

UNIX is a type of _____.

  1. application software
  2. remote access server
  3. storage area network
  4. operating system

D

27

Java and C++ are examples of _____.

  1. assembly language
  2. high-level languages
  3. machine language
  4. compiler languages

B

28

What is the name of the recently developed IBM supercomputer that has pushed the boundaries of a computer's ability to understand context in human language?

  1. Deep Blue
  2. System Z
  3. Cray
  4. Watson

D

29

Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a computer?

  1. advising an employee in a stressful situation
  2. searching the library for research articles about a certain topic
  3. designing the visual appearance of a new product
  4. deciding the best public relations response to a company scandal

B

30

Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a person?

  1. sorting a list of GPS coordinates by their driving distance from New York
  2. deciding which employee to hire for a customer service job
  3. finding the square root of a ten-digit number
  4. coming up with a list of products to recommend to a returning customer

B

31

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

  1. Terminal resource security
  2. Business continuity planning
  3. An access control system
  4. An intrusion detection system

B

32

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

  1. validity
  2. availability
  3. integrity
  4. confidentiality

B

33

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

  1. integrity
  2. reliability
  3. availability
  4. confidentiality

D

34

__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.

  1. Denial-of-service
  2. Keystroke logging
  3. Social engineering
  4. Computer fraud

D

35

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

  1. keystroke logging attack
  2. blended threat
  3. backdoor threat
  4. denial-of-service attack

D

36

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

  1. voice recognition
  2. weblogging
  3. disk mirroring
  4. social engineering

D

37

In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.

  1. Secure Sockets Layer
  2. Transport Layer Security
  3. Transmission Control Protocol
  4. User Datagram Protocol

A

38

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

  1. A public key infrastructure
  2. A private key infrastructure
  3. Secret key encryption
  4. Open key encryption

A

39

__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.

  1. Adware
  2. Freeware
  3. Silverware
  4. Hardware

A

40

The process of capturing and recording network traffic is referred to as _____.

  1. phishing
  2. pharming
  3. bombing
  4. sniffing

D

41

A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

  1. rootkit
  2. intrusion detection system
  3. firewall
  4. electronic tracker

C

42

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

  1. systems engineering plan
  2. security compliance plan
  3. risk assessment plan
  4. disaster recovery plan

D

43

Which of the following statements is true of phishing?

  1. It prevents the disclosure of information to anyone who is not authorized to access it.
  2. It monitors and records keystrokes and can be software or hardware devices.
  3. It involves sending fraudulent e-mails that seem to come from legitimate sources
  4. It consists of self-propagating program code that is triggered by a specified time or event.

C

44

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

  1. logic bomb
  2. firewall
  3. proxy server
  4. backdoor

D

45

Assuming your company takes basic security measures, which of these situations is probably the most alarming security breach?

  1. pranksters hack and vandalize the company web site
  2. someone spills coffee on a file server
  3. an executive's laptop is stolen
  4. an employee's computer is infected with a virus

C

46

Which of the following is an advantage of a database over a flat file system?

  1. A database uses more sophisticated security measures.
  2. Hardware and software start-up costs are low when using a database.
  3. A database is simple and easy to design.
  4. Programs and data are interdependent in a database.

A

47

A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

  1. data warehouse
  2. data dictionary
  3. data pattern
  4. data mine

A

48

In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.

  1. rational view
  2. logical view
  3. analytical view
  4. physical view

D

49

The__________of a database involves how information appears to users and how it can be organized and retrieved.

  1. analytical view
  2. rational view
  3. Select
  4. logical view
  5. physical view

D

50

In contrast to data in a transactional database, data in a data warehouse is described as subject oriented, which means that it _____.

  1. focuses on a specific area
  2. manages data transactions
  3. categorizes based on time
  4. captures aggregated data

A

51

Data warehouses are sometimes called hypercubes because they _____.

  1. capture raw transaction data
  2. store multidimensional data
  3. are function oriented
  4. manage transactions

B

52

A _____ is usually a smaller version of a data warehouse, used by a single department or function.

  1. data dictionary
  2. data domain
  3. data mart
  4. data mine

C

53

A request for data from the database is known as a ______.

  1. GET request
  2. remote procedure call
  3. retrieval
  4. query
  5. program

D

54

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

  1. create, read, update, and delete
  2. copy, read, update, and define
  3. copy, revise, undo, and define
  4. create, repeat, undo, and develop

A

55

The "variety" dimension of Big Data refers to the combination of _____.

  1. data definition and data manipulation
  2. structured data and unstructured data
  3. data warehouses and data marts
  4. object-oriented data models and relational data model

B

56

A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.

  1. stationary Web page
  2. static Web site
  3. flat Web page
  4. data-driven Web site

D

57

_____ is information about data—its content, quality, condition, origin, and other characteristics.

  1. raw data
  2. summary data
  3. metadata
  4. big data

C

58

In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.

  1. why the buyer buys a product or service
  2. how the buyer buys a product or service
  3. where the buyer is
  4. who the buyer is

A

59

In relational algebra, the _____ specifies which rows should be retrieved by a query.

  1. project operation
  2. find operation
  3. join operation
  4. select operation

D

60

In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.

  1. domain key
  2. foreign key
  3. serial key
  4. secondary key

B

61

BREAK

BREAK

62

The systems development life cycle (SDLC) is also known as the _____.

  1. ad hoc cycle
  2. agile cycle
  3. self-sourcing model
  4. waterfall model

D

63

Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?

  1. A document that contains the requirements for the current system to determine its main problem
  2. A document that drafts the details noted after conducting interviews and surveys with the prospective users of the system
  3. A document that contains operation-specific data collected by the analysts after observing the system's performance over a predefined period of time
  4. A document with exact specifications for executing the system, including procedures, hardware and software, and networking components

D

64

A__________is a written document with detailed specifications that is used to appeal bids for equipment, supplies, or services from vendors.

  1. milestone chart
  2. Select
  3. cost-benefit analysis report
  4. bill of materials
  5. request for proposal

E

65

Which of the following is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?

  1. The SDLC model has a separate planning and analysis phase, whereas XP combines both the phases into one phase.
  2. In the SDLC model, changes cannot be made to a system once it is delivered to the user, whereas the XP method delivers the system to the users and then make changes suggested by the user.
  3. The SDLC model develops an entire system at once, whereas XP uses incremental steps to improve an information system's quality
  4. Developers following the SDLC model cannot go on to the next phase until the current phase is finished, whereas in XP, developers can move to any phase from the current phase.

C

66

_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.

  1. Joint application design
  2. Extreme programming
  3. Rapid application development
  4. Service-oriented architecture

D

67

In _____ of the implementation phase of the systems development life cycle (SDLC), an old system is stopped and a new system is implemented

  1. pilot conversion
  2. plunge conversion
  3. phased-in-phased-out conversion
  4. parallel conversion

B

68

The end result of the__________of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.

  1. planning phase
  2. design phase
  3. implementation phase
  4. Select
  5. requirements-gathering phase

A

69

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

  1. data flow diagram
  2. conceptual data model
  3. context diagram
  4. flowchart

D

70

__________are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.

  1. Prototypes
  2. Structured systems
  3. Select
  4. Flowcharts
  5. Context diagrams

A

71

_____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.

  1. Economic feasibility
  2. Technical feasibility
  3. Legal feasibility
  4. Operational feasibility

D

72

Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).

  1. planning phase
  2. implementation phase
  3. design phase
  4. maintenance phase

C

73

Which of the following is a common cost-effectiveness analysis method?

  1. Corporate rate of return
  2. Internal rate of return
  3. Consolidated rate of return
  4. External rate of return

B

74

Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?

  1. Insourcing
  2. Venture sourcing
  3. Outsourcing
  4. Self-sourcing

C

75

Which of the following is an advantage of the joint application design (JAD) approach?

  1. It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for an application is not too narrow or one-dimensional in focus.
  2. It improves communication among users, top management, and information systems personnel because seeing a concrete model often prompts potential users of the system to ask questions, express opinions, and so forth.
  3. It reduces the need to train information system users and increases the system's chance of success by encouraging users' involvement.
  4. It provides a method for investigating an environment in which a problem is poorly defined and information is difficult to gather.

A

76

In the context of economic feasibility, which of the following statements is true of opportunity costs?

  1. They measure what an individual would miss by not having an information system or feature.
  2. They measure the changes in the scope of an information system after the analysis and design phases.
  3. They measure fixed and variable costs involved in running a system.
  4. They measure costs involved in training employees who will be using the information system.

A