BUSA 245 final exam review Quiz 1,2,3,4,5,6,7,8,9,10,11

¡Supera tus tareas y exámenes ahora con Quizwiz!

IT and MIS are functions within an organization that if used properly can increase the efficiency and effectiveness of an organization. When we talk about increased efficiency, it can be defined as? Select one: a. Doing the right thing b. Doing things right c. Buying the latest hardware d. Examine the Value Chain

Doing things right

Which of the following acronyms is NOT correctly defined

EPI- Electronic Data Integration

Which of the following is NOT a component of an ERP system?

GIS

Which of the following is NOT among the 5 Vs of big data: a. Variance b. Variety c. Veracity d. Value

a. Variance

A primary key made up of more than one field name is called a(n)? a. Foreign key b. Compound key c. Unique key d. Multiple key

b. Compound key

(01) You are working with a DBMS that has two tables Auto and Rental. The tables and contents are: Auto table contains vin# (primary key), make (text), color (text), mileage (number)Rental table contains customer# (number and part of primary key), date (date and part of primary key), vin# code (text and part of primary key) Which of the following queries correctly prints the make and color of all red cars? a. Select make, color From auto Where color=red b. Select make, color From auto Where color="red" c. Select make, color From rentalWhere color="red" d. None of those listed are correct

b. Select make, color From auto Where color="red"

Word and Facebook are examples of which of the following types of software? a. user b. application c. system d. control

b. application

How many bits are in one megabyte? a. One million b. Eight million c. One billion d. Eight billion

b. eight million

A smartphone is a computer system really not much different than a desktop computer, only a lot smaller. Which of the following would you NOT find inside a smartphone? a. RAM b. CPU c. Hard disk drive D. Screen

c. Hard disk drive

Which of the following is a nonbiometric security measure? Select one: a. Signature analysis b. Rootkit c. Callback modems d. Retinal scanning

c. callback modems

Software that secretly gathers information about users while they browse the web is referred to as? Select one: a. Trojan horses b. Worms c. Spyware d. Backdoors

c. spyware

Which type of encryption uses a public key to encrypt the message? Select one: a. SSD b. symmetric c. ANN d. asymmetric

d. asymmetric

Gathering _____ is part of the maintenance phase of the software development life cycle (SLDC). Select one: a. new funding b. competitive data c. performance data d. requests for proposals (RFPs)

performance data

A number of organizations, especially financial ones, are requiring an additional way for you to prove that you are the actual owner of the account to which you are attempting to gain access. This type of access control is referred to as? Select one: a. biometric security b. two factor authentication c. double verification d. none of these are correct

two factor authentication

A(n) _____ identifies a Web page and is the address of a document or site on the Internet. Select one: a. top-level domain b. Internet Protocol c. Weblog d. uniform resource locator

uniform resource locator

What is the security tool that provides a secure tunnel or "pipe" through the Internet? Select one: a. Virtual private network b. Firewall c. Public key infrastructure d. Virtual pipe net

virtual private network

In the following URL, which element is the top level domain name? http://www.amazon.com/alpha/people.html Select one: a. http: b. amazon c. .com d. alpha

.com

Which of the following is not a valid IP address? Select one: a. 192.168.1.1 b. 1.200.299.0 c. 101.2.12.144 d. 170.2.25.66

1.200.299.0

Which statement is true of an intranet? Select one: a. It aids the duplication and distribution of documents. b. It inhibits the sharing of software, such as an office suite or a database management system. c. It helps organizations move from a calendar-based document-publishing strategy to one that is based on events. d. It increases the costs and time of document production.

It helps organizations move from a calendar-based document-publishing strategy to one that is based on events.

Which statement is true of the Internet? Select one: a. It is less secure than an intranet. b. It is usually faster than an intranet. c. Its accessibility requires prior approval. d. Its geographical scope is limited.

It is less secure than an intranet

Revenue and business models are often used interchangeably but they are very different. Which of the following best describes a business model? Select one: a. It is how the business acquires high value customer b. It is how a business is funded c. It is part of a revenue model d. It is the framework for the entire organization

It is the framework for the entire organization

In Excel all the dates are based on a number, for instance the number 43600 when formatted as a date is 5/15/2019. The number is how many days since ___? Select one: a. January 1, 1900 b. January 1, 2000 c. January 1, 1800 d. January 1, 1950

January 1, 1900

A _____ is a device that connects a user to the Internet. Generally these devices connect DIRECTLY to a telephone line (such as AT&T with twisted pair) or a cable provider (such as Spectrum with coax cable). Select one: a. router b. server c. cookie d. modem

Modem

____ feasibility measures if the proposed system can work within the organization. Select one: a. Scheduling b. Technical c. Operational d. Financial

Operational

Which of the following is a primary activity in the Value Chain? Select one: a. Threat of new entrants b. Human Resources c. Firm Infrastructure d. Outbound Logistics

Outbound Logistics

Implementing an information system can be a complex endeavor. Project managers have tools to keep the project within budget and on schedule. Which of the following has lines and circles showing activities and when they begin and end? Select one: a. PERT b. RFP c. Agile methodology d. Gantt

PERT

During the implementation phase of the systems development life cycle (SDLC), in the _____ conversion, the old system and the new systems run together until testing is completed. Select one: a. phased b. plunge c. parallel d. pilot

Parallel

What is the correct order of the SDLC model? Select one: a. Requirements Gathering, Planning, Design, Implementation and Maintenance b. Planning, Requirements Gathering, Design, Implementation and Maintenance c. None of those listed are correct d. Requirements Gathering, Design, Programming, Implementation and Maintenance

Planning, Requirements Gathering, Design, Implementation and Maintenance

(01) You are working with a DBMS that has two tables Auto and Customer. The tables and contents are: Auto table contains vin# (primary key), make (text), color (text), mileage (number)Customer table contains customer# (number), name (text), address (text) and telephone# (number) You want to print a report that lists the the mileage and make of all Honda with under 50,000 miles. Which of the following is the correct Where statement? Select one: a. Where model=honda and mileage<50000 b. Where model="honda" and mileage<50000 c. Where model=honda and mileage<"50000" d. Where model="honda" and mileage<"50000"

Where model="honda" and mileage<50000

You need to add up all the values in cells C5, C6, C7, C8, C9, C10 and C11. Which of the following is the correct formula in Excel? a. =sum(C5:C11) b. none of those listed c. =sum(C5,C11) d. =sum(C5+C6+C7+C9+C10+C11)

a. =sum(C5:C11)

The Northwind database we are using has eight tables, one is the Product table. The primary key is Productid, but it also has two foreign keys. Which of the following is one of them? Select one: a. Categoryid b. customerid c. Shipperid d. unitprice

a. Categoryid

SQL is an example of which generation of computer languages? It is designed for end users. a. Fourth-generation language b. Assembly language c. Machine language d. First-generation language

a. Fourth-generation language

Which of the following is one of the forces of the Five Forces Model identified by Michael Porter (read them carefully)? a. Intraindustry competition b. Interindustry competition c. Barriers to entry d. Threat of buyers

a. Intraindustry competition

There are two ways that data can be presented or viewed in a data base. One is based on how it is stored and retrieved, the other is how it appears to the user. Which one is the way that it appears to the user? a. Logical view b. Physical view c. Sequential view d. Random view

a. Logical view

_____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. a. Normalization b. Triangulation c. Encapsulation d. Fragmentation

a. Normalization

A sequence of instructions that directs a computer to perform an action or series of actions is called a? a. Program b. SSD c. Cobol d. Language

a. Program

Choose the wrong answer: a. The third generation of computers are identified by miniaturization. b. The fourth generation of computers are identified by VLSI, personal computers, and optical discs. c. The second generation of computers are identified by transistors. d. The first generation of computers are identified by vacuum tube.

a. The third generation of computers are identified by miniaturization.

HTML, Cobol, C and Java are examples of which of the following? a. computer languages b. computer programs c. none of the items listed d. operating systems

a. computer languages

One of the following is NOT a type of mobile analytics: a. installation analytics b. Performance analytics c. in app analytics d. Advertising and Marketing analytics

a. installation analytics

In HTML there is an <i> ....... </i> instruction. When the web browser displays the text between the <i> and </i> how will the text appear on the display? a. italics b. inverted c.indented d. indexed for search engines

a. italics

In a(n)__________, records can be accessed in any order, regardless of their physical locations in storage media. Select one: a. random access file structure b. logical access file structure c. sequential access file structure d. physical access file structure

a. random access file structure

Which of the following is not one of the functions provided by the operating system of a computer? a. word processing b. communications c. resource allocation d. data management

a. word processing

Signing onto a computer system is a three step process even though it feels like a single one. Which is the second step? Select one: a. Identification b. Authentication c. Integrity d. Authorization

authentication

In class, we discussed the speed of computers. Usually the faster the clock runs the faster the computer operates. Which of the following is an example of a clock speed? a. 4 Gigabyte b. 2.5 Gigahertz c. 7200 rpm d. 10 Megabits

b. 2.5 Gigahertz

If you copy the formula =A2+A3 from cell B10 to B11, the formula in B11 will be which of the following? a. None of those listed b. =A3+A4 c. =B2+B3 d. =A2+A3

b. =A3+A4

Which of the following best defines an operating system? Read the answers carefully, two look very similar, but quite different. a. It is the main circuit board containing connectors for attaching additional boards. b. It is a set of programs for controlling and managing computer hardware and software. c. It is a computer and all the software for managing network resources and offering services to a network. d. It is a collection of disk drives used for fault tolerance, typically in large network systems.

b. It is a set of programs for controlling and managing computer hardware and software.

Which of the following are two popular data visualization platforms? a. OLTP and OLAP b. Power BI and Tableau c. Excel and PowerPoint d.Apache and Cassandra

b. Power BI and Tableau

Which type of analytics develops models from the past to predict the future or ascertain the impact of one variable on another? Select one: a. Slice and dice b. Predictive c. Descriptive d. Forecast

b. Predictive

In the relationship diagram below from the marketing department of a small bank, what is the key field for the CS Reps table? a. None of those listed b. Rep Number c. Account Number d. Customer Acct Numb

b. Rep Number

There are three methods for accessing files listed in the textbook (hint, the third one is ISAM). Don't confuse with the three models or structures of a DBMS. The two are? Select one: a. Hierarchical and network b. Sequential and random c. Physical and logical d. Oracle and Access

b. Sequential and random

Business analytics is defined as? Select one: a. Collecting data from a variety of sources to build a data cube. b. Using data and statistical methods to gain insights into data and provide decision makers with information they can act on. c. The process if extracting, transforming and loading data. d. CRUD (create, read, update and delete) big data.

b. Using data and statistical methods to gain insights into data and provide decision makers with information they can act on.

A _____ stores definitions, such as field names, data types for fields, default values, and validation rules for data in each field. Select one: a. data mine b. data dictionary c. data mart d. data warehouse

b. data dictionary

In the following file name, what are the names of the folders that contain the actual file? C:\user\busa345\lab5.xlsx Select one: a. C:\user b. user and busa345 c. user, busa345 and lab5 d. C:\

b. user and busa345

Which of the following are NOT true about a screen with 1920x1080 resolution? a. Each of the 1920 times 1080 = 2,073,600 pixels on the screen are individually addressable b. It is referred to as a 4K device c. There are 1920 pixels horizontally d. The color and intensity of each pixel can be individually controlled

b.It is referred to as a 4K device

Which of the following is NOT an example of an output device? a. A cathode ray tube b. An inkjet printer c. A camera d. Speakers

c. A camera

Which of the following statements is true of data marts and data warehouses? a. Access to data is often slower in data marts than in data warehouses. b. Consolidating information from different departments is easier in data marts than in data warehouses. c. Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. d. Data marts have more extended scope than data warehouses.

c. Despite being smaller, data marts can usually perform the same type of analysis as data warehouses.

Which of the following is the process of taking data from internal and external data sources and creating a data warehouse? Select one: a. Create, Read, Update, Delete b. Online Analytic Processing c. Extract, Transform, Load d. Extract, Tag, Link

c. Extract, Transform, Load

In class we discussed the five generations of languages. Which one is the only one that a CPU can process directly - the native language of the computer? a. Non-procedural b. Assembler c. Machine d. Procedural

c. Machine

(01) Databases can be designed for speed of transaction processing or ease of use. Which of the following processing approaches rely on databases designed for ease of use? Select one: a. ETL b. CRUD c. OLAP d. OLTP

c. OLAP

There are two major types of software. Which of the following are examples of application software? a. Python b. C++ and Java c. PowerPoint and Adobe Acrobat d. Microsoft Windows and Linux

c. PowerPoint and Adobe Acrobat

There are two different types of memory devices, primary (also called main or internal) and secondary (also called external). Disk drives and thumb drives are examples of _____. a. Arithmetic units b. ROM c. Secondary memory d. Primary memory

c. Secondary memory

In an analyzation of the auto industry in the US using Porter's Five Forces (including the level of competition within the industry) riding a bicycle, taking public transportation and walking are examples of items that appear in which ONE of the five forces? a. Threat of New Entrants b. Bargaining Power of the Buyer c. Threat of Substitutes d. Bargaining Power of the Supplier

c. Threat of Substitutes

In a relational model, when a primary key for one table appears as a field name in another table it is called a _____ key in the second table. Select one: a. domain b. secondary c. foreign d. surrogate

c. foreign

In a relational database table the rows and columns are referred to as: a. rows are called field names and columns are called records b. rows are called primary and columns are called secondary c. rows are called records and columns are called field names d. rows are called cells and columns are called files

c. rows are called records and columns are called field names

English is the most widely spoken language in the world because it is spoken by a large number of people as a second language. What language has the largest number of native speakers? Select one: a. Hindi b. Spanish c. Chinese d. English

chinese

If we cannot avoid a IT risk, we can try to minimize the impact of some risks. Which of the following is the best way to protect against a power outage for a desktop computer? Select one: a. Backup the ROM frequently b. Install antivirus software c. Use biometric security d. Connect to a UPS device

connect to a UPS device

You have just conducted a Value Chain analysis of your pizza parlor. A lot of customer feedback indicates that it took a long time for the server to take their order. Where does this issue fall on Porter's Value Chain? Select one: a. Customer service b. Outbound logistics c. Inbound logistics d. Operations/manufacturing

customer service

Which of the following HTML codes will display text in the largest size? a. <h1> This is the largest text size <\h1> b. <h6> This is the largest text size <\h6> c. <h6> This is the largest text size </h6> d. <h1> This is the largest text size </h1>

d. <h1> This is the largest text size </h1>

Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight in data c. Allowing analyzing data with different formats d. All of the above

d. All of the above

In class we talked about big data and data mining. The textbook discusses three types of business analytics. Which of the following is not one of them? a. Predictive b. Descriptive c. Prescriptive d. Informative

d. Informative

In a DBMS, the field that uniquely identifies a record in a relational database table is called a ____? Select one: a. Foreign key b. Data dictionary c. Relational key d. Primary key

d. Primary key

The data manipulation component of a DBMS usually includes a query language. Which of the following is a type of DBMS query language? a. QUB b. Access c. Java d. SQL

d. SQL

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system. Select one: a. backdoor threat b. blended threat c. keystroke logging attack d. denial-of-service attack

denial of service attack

A transaction in which money or script is exchanged only electronically is called a(n). Select one: a. Micropayments b. Click-through c. Virtual wallets d. Electronic payment

electronic payment

Which of the following is a biometric security measure? Select one: a. Firewalls b. Electronic trackers c. Passwords d. Facial recognition

facial recognition

The most serious problem with wikis is the: Select one: a. inaccuracy of content. b. inability to modify content. c. restricted access to the general public. d. lack of data privacy.

inaccuracy of content.

Processing an order faster than a prior system is an example of which of the following? Select one: a. intangible cost b. intangible benefit c. tangible benefit d. tangible cost

intangible benefit

Buying and selling of goods and services over the Internet using a smartphone is referred to as? Select one: a. e-business b. s-commerce c. e-commerce d. m-commerce

m-commerce

During the _____ phase of the systems development life cycle (SDLC), an information system is operating but enhancements, modifications and bug fixes are installed to keep the system running properly. Select one: a. design b. planning c. implementation d. maintenance

maintenance

What e-commerce business model is similar to the traditional brick and mortar store that sells goods and services, such as WalMart and Target? Select one: a. infomediary b. brokerage c. merchant d. subscription

merchant

Sending fraudulent emails that look legitimate is an example of? Select one: a. phishing b. pharming c. sniffing d. adware

phishing

During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language. Select one: a. conceptual b. physical c. logical d. virtual

physical

Financial, technical, operational, schedule and legal feasibility studies are conducted in which phase of the SDLC? Select one: a. Design b. Requirements Gathering c. Planning d. Implementation

planning

In the client/server model, software runs on the local computer and communicates with the remote computer. What is the remote computer called? Select one: a. Router b. None of those listed c. Server d. Client

server

_____ take advantage of the human element of security systems. Select one: a. Denial-of-service attacks b. Trojan programs c. Blended threats d. Social engineering attacks

social engineering attacks

_____ refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies. Select one: a. Social networking b. Podcasting c. Weblogging d. Gigapop

social networking

DNS (Domain Name System) servers translate domain names into _____. Select one: a. MAC addresses b. hypertext c. proxy servers d. IP addresses

IP addresses

The ___________ component of an (old) enterprise resource planning (ERP) system provides information on assessing job candidates.

Human Resources

The textbook lists five generations of computer hardware. Which of the following is the one found in the classroom PCs and our smartphones (hint - 4th gen)? a. Parallel and optical b. VLSI - very large scale integration c. Transistors d. Vacuum tubes

B. VLSI - very large scale integration

RAM is different from ROM in that RAM is: a. nonvolatile b. secondary memory c. volatile d. removable

C. Volatile

Which "sourcing" describes when an organization has external volunteers to develop an information system or components? Select one: a. Out-sourcing b. In-sourcing c. Crowdsourcing d. Self-sourcing

Crowdsourcing

All of the following are among the most popular mobile marketing strategies except: Select one: a. Location-based marketing b. Customer-based marketing c. App-based marketing d. In-game mobile marketing

Customer-based marketing

Which of the following best describes reverse logistics?

Returning goods to the seller

What is the method for improving the volume or quality of traffic to a Web site from a site such as Google or Bing? Select one: a. GIS b. SEO c. TCP d. B2C

SEO

A feasibility study examines the potential for a new system from five different perspectives. Which perspective would include an analysis of the availability of hardware and software to implement the system? Select one: a. Operational b. Financial or Economic c. Technical d. Legal

Technical

__________is a service that uses the Internet rather than the telephone network to exchange spoken conversations. Select one: a. Internet relay chat b. Instant messaging c. VoIP d. Email

VoIP

The _____ denotes the type of organization or country the address of a document or site on the Internet specifies. Select one: a. top-level domain b. network interface card c. User Datagram Protocol d. Post Office Protocol

top-level domain

An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general, it does not have its headquarters in a particular country. Select one: a. transnational b. international c. multinational d. global

transnational

Global information systems are challenging to implement. Which of the following is NOT one of the obstacles faced by developers when developing a global website? Select one: a. Date and money formats b. Cultural differences c. Web server performance d. Diverse regulatory practices

web server performance

You work for Bluegrass Car and Bike rentals. You need to write a SQL query that joins two tables, Rental and Bike. Which of the following is the SQL statement to join the two tables? Select one: a. Where rental = bike b. Where rental.bikeid = bike.description c. Where rental.bikeid = bike.bikeid d. Where customer.dlicense = rental.dlnumber

where rental.bikeid=bike.bikeid


Conjuntos de estudio relacionados

COP3503C - Quiz 2 Study Guide - Classes

View Set

Chapter 10 Bony Thorax- Sternum and Ribs

View Set

Chapter 13. Efficient Capital Markets and Behavioral Challenges

View Set

Chapter 32: Care of Critically Ill Patients with Respiratory Problems

View Set