exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. What is infrastructure in IT? a. It is the hardware, software, networks that provides the framework needed to support the applications, data, and communications of the enterprise b. The hardware that provides computing power and data storage for several files c. The means of providing a centralized location for shared computing resources d. The basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise

a

10. Brochure Ware is considered: a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0

a

27. _____ is a specialized DSS that supports senior level executives within the organization. a. EIS b. ERP c. AI d. OAS

a

29. Which of the following is an organizational information system? a. Enterprise Resource Planning System (ERP) b. Supply Chain Management Systems c. Electronic Commerce Systems d. All of the above

a

3. An asset is _______. a. People, property, and information b. Anything that can exploit a vulnerability c. Weaknesses or gaps in a security program d. An action that can prevent threats

a

3. Application delivery and support ensure all the following EXCEPT: a. Users receive correct data b. Technology is properly updated c. Users receive correct technology d. The technology is properly updated

a

3. Database applications can consist of a collection of which of the following? a. Forms b. Figures c. Records d. All of the above

a

3. This is the mathematical method for handling imprecise or subjective information. a. Fuzzy logic b. Cloudy computation c. Sandy math d. Indecisive reasoning

a

4. Which of the following is a risk of cybercrimes? a. Financial losses b. Criminals c. Nature d. Human error

a

4. ________ is any web application that supports the creation and sharing of user-generated content (UGC). a. Social media b. Business intelligence c. CRM d. Internet of things

a

5. This is an example of a discrete variable. a. Zip code b. Salaries c. Revenue d. Length

a

5. Which of the following is the most expensive part of ERP? a. Labor b. Upgrades c. Hardware d. None of these

a

6. The three main components of IT infrastructure consist of________ , _________ and __________ . a. Hardware, software, networks b. Hardware, software, servers c. Software, servers, operating systems d. Operating systems, anti-virus, networks

a

6. What is an Information System? a. System that interacts to produce information b. Security program c. Device used for finding information d. Intelligent computer designed to complete task

a

6. _____ is data that is used to describe data. a. Metadata b. Database c. Biodata d. DBMS

a

7. A _________ outlines at a high level all work required to complete the project. a. project scope statement b. system description c. project initiation d. customer contract

a

7. Bar Charts contain what type of Data? a. Continuous Data b. Discrete Data c. None of the above d. A and B

a

7. What networks connect computers in close proximity to shared resources and data, information? a. Local Area Networks (LAN) b. Wide Area Networks (WAN) c. Personal Area Networks (PAN) d. WiFi

a

8. What is an example of a business facing process? a. Strategic planning b. New product c. Order processing d. Customer billing

a

8. What is security? a. The protection afforded to an automated information system in order to attain the applicable objectives. b. An effective information security program is essential to the protection of the integrity and value of the organization's data c. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. d. An action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.

a

8. __________ connects and provides access to LAN through a wireless connection point. a. WiFi b. USB c. Bluetooth d. PAN

a

9. A __________ is a type of hardware that provides computing power and data storage for several different devices. a. Server b. Network c. WAN d. LAN

a

9. Asset + Threat + Vulnerability = a. Risk b. Attacks c. Countermeasure d. Compromise

a

9. What is a collection of components producing information from data? a. Information Systems b. Data analytics c. Hard drive d. None of the above

a

9. ______ is a data mining analysis, which measures the effect of a set of variables on another variable. a. Regression Analysis b. Market Basket Analysis (MBA) c. Supervised Data Analysis d. Unsupervised Data Analysis

a

1. Data visualization help us make ________ decisions without having to read pages of tables and data. a. interpolated b. Quick c. Inaccurate d. None of the above

b

1. The problems posed by information silos lead to ____. a. Decreased costs for an organization b. Increased costs for an organization c. An easier way to exchange data d. Faster, more accurate business procedures

b

1. Which type of security only protects data in its electronic form? a. Information Security b. Cybersecurity c. IT Security d. Both A and C

b

10. Which of the following is not a goal of data visualization? a. Answer Questions b. Inspect and Cleanse Data c. Find Patterns d. Support Decision Making

b

10. Who would most commonly use an Office Automation System? a. CEOs b. Clerical Staff c. Customers d. Suppliers

b

11. Two key activities of collaboration are: a. Communication and Bounce Back b. Communication and Iteration c. Iteration and Bounce Back d. Bounce Back and Mediational Sources

b

5. What is a negative aspect of WIFI? a. Easy to utilize for anybody trying to harness it. b. Users are not restricted one physical location c. Information transfer is fast an convenient d. Provides lots of vulnerabilities

d

2. Which of the following are challenges of implementing an ERP system? a. People b. Decision-Making c. ERP Upgrades d. All of the above

d

2. Which of the following is NOT a component of information System? a. Hardware b. People c. Procedures d. System

d

2. Which one is not a rule of thumb with regards to data visualization? a. Label correctly b. Choose the correct scale c. Use color correctly d. Use "Times New Roman" as a font

d

20. What is a common entry level position to the IT organization? a. Systems Network Analyst b. Product Analyst c. Database Administrator d. Help desk

d

20. Which of the following is NOT an advantage of databases? a. Better data integration b. Less Data inconsistency c. Increased end-user productivity d. Better Customer Relationships

d

20. Which of the following is incorrect regarding Collaborative Systems? a. They offer support in communication and collaborative efforts of team groups b. Google Drive is an example of a Collaborative System c. Collaborative Systems support daily work activities for groups of people d. Collaborative Systems can only work when all group members are logged in at the same time

d

22. An example of a transaction in a business environment is: a. Selling a product b. Shipping a box c. Hiring an employee d. All of the above

d

23. What category does Information Systems fit into? a. People b. Technology c. Organization d. All of the above

d

25. Which major characteristic is not a part of Transaction Process System (TPS)? a. Large amounts of data are processed b. High processing speed is needed due to the high volume c. Low computation complexity is usually evident in TPS d. Low reliability rate

d

3. Low quality information can cause the following results except: a. Difficulty tracking revenue due to inaccurate invoices b. Marketing to nonexistent customers c. Inability identify selling opportunities d. Successful outcomes resulting from data driven decisions

d

5. Which of the following are information types: a. Transactional information b. Conditional information c. Analytical information d. A and C

d

5. Which of the following are parts of a database? a. Entities b. Instants c. Attributes d. All of the above

d

6. A Baseline Project Plan includes: a. system description b. project scope statement c. management issues d. all of the above

d

6. Which is not a construct in the circle of risk? a. Assets b. Attacks c. Countermeasures d. Safeguard

d

6. Which of the following is a component of a Business Process? a. Actors b. Resources c. Support d. Both A and B

d

7. Cyber security: a. Does not involve Internet b. Protects data c. Does involve the Internet d. Both b and C

d

7. Database is a collection of all of these except ______? a. Forms b. Reports c. Queries d. Credits

d

7. Which industries use ERP systems? a. Government b. Retail c. Manufacturing d. All of the Above

d

30. SAP is which type of Information Systems? a. Office Automation System (OAS) b. Collaborative Systems c. Supply Chain Management Systems d. Enterprise Resource Planning System (ERP)

d

4. Which is a goal of data visualization? a. Support Decision making b. Support graphical calculation c. See data in context d. All of the above

d

4. Which of the following components can create a problem? a. Hardware b. Software c. Data d. All of the above

d

4. Which of the following is NOT a successful strategy for project management? a. Top-down leadership b. Proper selection of projects c. Realistic time table d. Intermittent development strategy

d

4. Which of the following is a component of a business process? a. Actors b. Resources c. Roles d. All of the above

d

4. Which of the following is a server type? a. Web Server b. Database Server c. Manual Server d. Both A and B

d

5. Big Data is a term used to describe data collections that are characterized by all of the following, except: a. Volume b. Velocity c. Variety d. Verification

d

7. Which is NOT an Information System? a. Transaction Processing System b. Artificial Intelligence System c. Decision Support System d. Managerial Development System

d

7. Which of the following devices is NOT considered to be an example of an Internet of Things (IoT) device? a. Fitbit b. Medical Devices c. Amazon's Echo d. Laptop

d

1. A system can be defined as: a. Group of components that do not interact b. A non-interactive approach to processing information c. Group of components interacting to achieve some purpose d. Using data to achieve some purpose

C

10. Information security performs what important functions for an organization? a. Enables the safe operation of applications implemented on the organization's IT systems. b. Organization safeguard applications c. Organizations must create integrated, efficient, and capable applications d. Rely upon risk frameworks

a

10. What type of business process results in a product or service that is received by an organization's external customer? a. Customer-Facing Process b. Industry-Specific Customer Facing Process c. Business-Facing Process d. Business Process Model

a

10. What type of server allows for the use of multiple servers without the need to have a number of "real" servers? (UT's V-lab is an example of this server type.) a. Virtual b. Application c. Direct d. Data

a

11. How do organizations solve the problems of information silos? a. Data integration into a single database and revise applications to use that database b. Data isolation decisions that work to enhance organizational efficiencies c. Integrated departmental cost sourcing d. Limit data sourcing of information

a

11. The goal of project planning is to? a. Define clear, discrete activities and the work needed to complete each activity b. Decide if a project is economically feasible for the company c. Describe how the project will benefit the company d. Select which projects the company will complete in the upcoming year

a

12. Data visualization conveys information through...? a. Graphical representations b. Numbers c. Lectures d. Textbooks

a

12. LAN is a network that... a. Connects computers together in a close proximity b. Connects systems in a wide region c. Connects networks to networks d. Allows users to access the wide web

a

12. Parts of a database include: a. Tables rows, columns b. Tables, rows, lines c. Rows, lines, columns d. Queue, row, columns

a

12. What is the first part of the Transaction Processing Model? a. Data Input b. Data Processing c. Output Generation d. Data Storage

a

13. _______ is defined as an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network. a. Countermeasure b. Risk c. Threat d. Vulnerability

a

14. An information system designed to provide additional analytical support of organizational data a. Decision Support System b. Capture System c. Transaction Processing System d. Computer application

a

14. Project Initiation involves: a. Assessing size, scope, complexity, and establish procedures b. Define discrete activities and the work required to complete each activity c. Plans created that are put into action d. Closing down the project and wrapping it up

a

14. Understanding _________ is based around preferences, buying behaviors, and price sensitivity. a. Customers b. Employees c. Operations d. Business

a

15. The main information silo problem is that: a. Data is isolated in separate information systems b. Customers do not know how to use data c. There is too much data in one place d. Managers cannot access the data

a

15. Which graph would provide the best illustration of trends based on growth per year? a. Line Chart b. Pie chart c. Bubble Chart d. Scatter Chart

a

16. What is the objective for utilizing visual representation of information? a. Support decision making b. To help customers gain a better understanding of product integrity c. To facilitate the sharing of thoughts and observations d. Eliminate suggestion

a

16. What structure breakdown divides the project into manageable and logically ordered tasks and subtasks? a. Work Breakdown Structure b. Time Breakdown Structure c. System Breakdown Structure d. Computer Breakdown Structure

a

16. Which application is used to show data in a structured form? a. Report b. Queries c. Application program d. Form

a

16. Which is a part of IT Governance? a. Risk Management b. Supervising the progression of a project c. Ensuring that the network is properly working d. End user support for technology

a

17. A specialized Decision Support System that supports senior level executives within the organization is a. Executive Information System b. Artificial Intelligence c. Electronic Commerce System d. Office Automation System

a

17. Which of the following can be a problem with multi-user databases? a. Lost Update Problem b. Unclear Data Problem c. Access Problem d. Browser Identifier Problem

a

18. What is the most used social media metric used by companies? a. Hits/visits/page view b. Profit per customer c. Repeat Visits d. Abandoned shopping carts

a

18. Which variable type cannot be divided? a. Discrete b. Eccentric c. Perishable d. Numerical

a

19. Each of the following are examples of data automation except: a. Laptops b. Card readers c. Scanners d. Bar code readers

a

19. Which of the following is an activity of BI? a. Analyzing b. Production c. Reports d. Regression

a

2. The amount data increases over time in a _____________ manner. a. Exponential b. Linear c. Logarithmic d. Polynomial

a

2. Which of the following contains the best estimate of a project's scope, benefit, cost, risks, and resource requirements? a. Baseline project plan b. Project initiation plan c. Project deliverable plan d. Project development plan

a

2. Which type of communication requires all team members to be available to collaborate at the same time? a. Synchronous b. Business intelligence c. Asynchronous d. None of the above

a

20. The solutions to information silos are? a. Enterprise Application Integration (EAI) & Enterprise Resource Planning (ERP) b. Enterprise Application Integration (EAI) & Enterprise Retirement Procedure (ERP) c. Human Resources (HR) & Finance (FI) d. External Application Information (EAI) & Enterprise Response Planning (ERP)

a

11. What is the difference between structured and dynamic processes? a. Structured processes evaluate seasonal promotions plan, and schedule cashiers, while dynamic processes order supplies, pay bills, check out customers b. Structured processes are formally defined process, activity flow fixed, while dynamic processes are less specific, more adaptive, and intuitive c. All of the above d. None of the above

b

12. Iteration control occurs when: a. Collaboration tools are hacked b. Collaboration tools limit and direct user activity c. Collaboration tools monitor synchronized locations d. VIZIO connects with markets

b

12. Which of the following is not one of the four functions of information security in an organization? a. Protects the organization's ability to function b. Creates security technology for the organization c. Safeguards the technology assets in use by the organization d. Protects the data the organization collects and uses

b

13. Most ERP systems require ongoing maintenance. Make sure to ask your vendor about the ongoing maintenance costs with _____________. a. Hardware Maintenance and Network Fees b. Hardware Maintenance, support, network fees, etc. c. Labor and Hardware Maintenance d. This statement is false, there are no ongoing costs for maintenance with ERP systems

b

13. What does "IoT" stand for? a. Inside of Technology b. Internet of Things c. Iteration-opportunity Type d. Information Technology

b

13. What is the most commonly used Decision Support System? a. Microsoft PowerBI b. Microsoft Excel c. Internet Explorer d. SAP BEx Analyzer

b

14. What does the acronym "Wi-Fi" stand for? a. Wireless Fibrillation b. Wireless Fidelity c. Wireless Field d. Wireless Filtration

b

14. Which level of process modeling shows end-to-end processes across the above operational areas a. Level One b. Level two c. Level three d. Level four

b

15. Characteristics of _________ are accurate, timely, relevant, just sufficient, worth its cost, and secured. a. Low Quality Information b. High Quality Data c. High Quality Information d. None of the Above

b

15. What is responsible for creating tables and defining their relationships? a. Database b. Database Management System (DBMS) c. Database application d. Data entry personnel

b

17. EAI Stands for: a. Electronic Accessed Information b. Enterprise Application Integration c. Electronic Application Information d. Enterprise Application Information

b

17. Which is not considered to be a functional area of IS? a. Governance b. Marketing and Promotion c. Project Management d. Infrastructure

b

18. What are the five elements of the ERP systems? a. Materials, Resources, Procedures, Computers, and Employees b. Data, Hardware, Software, Procedure, and People c. Data, Software, Hardware, Processes, and People. d. Procedure, Processes, People, Management, and Data

b

2. A value in one row of one table that appears as a value in another row of another table is called a. Foreign Key b. Key c. Primary Key d. None of The above

b

2. What kind of information system is a neural network? a. Transaction Processing system b. Artificial intelligence system c. Executive Information System d. Decision Support System

b

2. Which type of business process results in a product or service that is received by an organization's external customer? a. Business facing process b. Customer facing process c. Business process modeling d. None of the above

b

21. What is the SAP Module abbreviation for Financial Accounting? a. FA b. FI c. FN d. FG

b

22. Which of the following is the correct sequence for creating information systems? a. Testing, Implementing the Design, Gathering Data, Designing the System, and Deploying the System b. Gathering Data, Designing the System, Implementing the Design, Testing, and Deploying the System c. Implementing the Design, Gathering Data, Updating Infrastructure, Designing the System, and Testing d. Gathering Data, Implementing the Design, Updating Infrastructure, Testing, and Deploying the System

b

23. Which of the following best describes an Organizational type of classification? a. Supports activities, duties of a particular functional area of the organization b. Supports entire organization's activities with an integrated package c. Connects two or more organizations and supports inter-organizational operations d. Only supports the area that provides the organization with the highest profit

b

3. What is a data center? a. A building that people go to and store data b. A facility that houses a plethora of servers c. A room inside the workspace with that stores data for that building d. A data storing machine in the middle of nowhere

b

3. What is an information silo? a. Consolidation of data for real-time sharing of data b. Data isolated in separate information systems c. Workgroup information systems that support a particular business function d. A cultural collaboration of shared information of business processes that prevents data isolation.

b

3. When using a Gantt chart for scheduling diagrams, how are the task durations represented? a. Vertical bars b. Horizontal bars c. Vertical and horizontal lines d. Boxes and links

b

3. Which one of the following best describes Web 2.0? a. Only one-way communication b. Encourages reader feedback c. Only a few content providers d. None of the above

b

5. Studies have found that ___% to ___ % of all IT projects fail at one stage or another. a. 20% to 40% b. 40% to 60% c. 60% to 80% d. none of the above

b

5. Used by the highest level employees to review internal and external data to make big business decisions. a. Presidential Decision Maker b. Executive Information System c. Decision Support System d. Exclusive Business Intuitive Systems (EBIS)

b

5. What is a Business Process? a. An item necessary to accomplish an activity b. A set of activities that accomplish a specific function c. A way to build your business d. A way to enforce rules and regulations in a company

b

5. What is a system? a. One component working independently b. Group of components interacting to achieve some purpose c. One person entering data into a program d. Group of people each working on a separate task

b

6. Big Data refers to data sets that are at least a ______ or larger in size? a. Megabyte b. Petabyte c. Gigabyte d. Terabyte

b

6. Example of a continuous variable. a. Letter Grades b. Revenue c. Employees d. ZIP code

b

6. What is data? a. process of and tools for storing, managing, using and gathering of data and communications in an organization b. facts and statistics collected together for reference or analysis c. the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information d. not vital to an organization

b

6. Which of the following is the most used ERP system? a. Oracle b. SAP c. InFor d. Microsoft

b

7. What are the five components that make up an information system? a. Computer hardware, software, data, technology, security b. Computer hardware, software, data, procedures, people c. Security, data, business, monitors, software d. Data, security, software, computer hardware, procedures

b

8. Histograms contains what type of Data? a. Continuous Data b. Discrete Data c. None of the above d. A and B

b

8. What are the steps in a Transaction Processing Model? a. Data Input- Output Generation- Data Processing b. Data Input- Data Processing-Output Generation c. Output Generation- Data Input- Data Processing d. Data Storage-Output Generation-Data Input

b

8. ________ occur(s) when data is isolated in separated information systems. a. Processing b. Information silos c. Scheduling d. System integration

b

9. Post-project reviews will a. be harmful because you may not get the feedback you anticipated b. ensure that future projects can avoid any issues that may have occurred during the execution of the just completed project c. guarantee a signed customer contract d. none of the above

b

9. What is a Primary Key? a. A value in one row of one table that appears as a value in another row of another table b. A value that identifies a unique row in a table c. A value in a table that appears as a unique key in another table to which it relates d. All above the above describe a Primary Key

b

1. A study that determines whether a requested system makes economic and operational sense for an organization is a: a. Accountability study b. Work development study c. Feasibility study d. System service study

c

1. What is the general function of a (Transaction Processing Systems) TPS ? a. To assist in high level business decision making processes. b. To provide middle managers information on employee performance. c. To track day to day business events. d. All of the above.

c

1. Which of the following is not an advantage of databases? a. Improvement in Data Sharing b. Improvement in Data Access c. Improvement in Process Mapping d. Improvement in Decision Making

c

1. Which of the following is not part of the Business Process? a. Has a goal b. Uses resources c. Explains an action d. Has specific inputs

c

1. ________ is a dynamic process where a group of people work together to achieve common objectives. a. Social media b. Business intelligence c. Collaboration d. Internet of things

c

10. Advantages of databases are improved by all of the following except: a. Data sharing b. Data security c. Data productivity d. Data access

c

10. PC, server, keyboard, and routers are examples of...? a. Software b. Procedures c. Hardware d. Data

c

10. Which of the following is not a phase in the project management process? a. Initiation b. Closedown c. Feasibility Test d. Execution

c

11. This type of data management asset is based around critical nouns of business, fairly static and generally fall into 4 categories: people, things, places and concepts a. Unstructured b. Metadata c. Master Data d. Transactional

c

11. What does the acronym "WAN" stand for? a. Wireless Access Network b. Windows Access Network c. Wide Area Networks d. Web Area Network

c

11. What is the user's role in development of a database? a. Users are final judges as to the data in the database b. Users should review the data models before developing the database c. A and B d. None of the above

c

11. What is vulnerability? a. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. b. An action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network. c. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. d. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, destroy or make unauthorized use of an asset.

c

12. ERP system benefit(s) include _______. a. The elimination of redundant processes b. The elimination of redundant tasks c. Both A and B d. Neither A or B

c

13. Understanding _________ is based around drive efficiencies, expose variability and control quality, and optimization. a. Customers b. Employees c. Operations d. Business

c

13. Which of the following is the purpose of why organizations needs the business process a. Reduce risk, scalable b. Enforce policies, produce consistent results c. A and B are correct d. None of above

c

14. Which answer is not an improvement due to databases? a. Data sharing b. Data access c. Data quality d. Data security

c

14. Which graph would best illustrate the trends showing the history of student grades for this class? a. Pie Chart b. Histogram c. Line Chart d. Scatter Chart

c

2. What types of hardware does infrastructure manage as a responsibility? a. Networks b. Servers c. Desktops

d

14. Which of the following is a main difference between Web 1.0 and Web 2.0? a. Web 1.0 enables everyone to be a content provider b. Web 1.0 encourages reader feedback c. Web 2.0 enables everyone to be a content provider d. Web 2.0 only allows one-way communication

c

15. The cost of a data breech does not include____. a. Legal Costs b. Business Disruption c. Researching and developing new data d. Remediation

c

15. What major factor that can make or break a project? a. Price b. Timeliness c. User-Friendly d. Resources availability

c

16. What is EDI? a. Enterprise Decision Information b. Executive Decision Information c. Electronic Data Interchange d. Executive Data Information

c

16. Which of the following describes web 2.0? a. Brochure ware b. Web 2.0 does not exist c. Encourages reader feedback d. Only has a few providers

c

17. Define Data Visualization? a. Placing data into binary b. Scanning for virus infiltration c. Putting data into context for easier consumption d. The process of synthesizing information for the benefit of a customer

c

17. Which of the following are examples example(s) of web 2.0 at work? a. Twitter b. Youtube c. Both a & b d. None of the above

c

18. Big Data differs from relational databases by all of the following except their: a. Huge Volume b. Rapid Velocity c. Rates of Return d. Great Variety

c

18. Which classification describes at type of information systems that connects two or more organizations and supports business operations? a. Departmental b. Organizational c. Inter-Organizational d. All of the above

c

19. What are the challenges of implementing an ERP system? a. ERP upgrades, Customer Challenges, & Training b. Decision-Making Challenges, Training, & Customer Challenges c. Decision-Making Challenges, People Challenges, & ERP upgrades d. Outdated Technology, Customer Complaints, & Training

c

2. Attacks exploit _________. a. Risks b. Assets c. Vulnerabilities d. Threats

c

21. Which of the following is NOT one of the five components of the information system? a. Software b. People c. Management d. Procedure

c

21. Which of the following is true of Transaction Processing Systems? a. Small amounts of data are processed b. Inquiry processing is recommended but not required c. Large storage capacity is needed d. Input and output data do not need to be standardized

c

24. What is an inter-organizational system? a. An information system that supports activities and duties of specific functional area b. An information system that supports entire organization's activities with an integrated package c. An information system that connects two or more organizations and supports organization business operations d. An information system designed to provide managerial reports

c

26. Executive information system is not? a. Highly intuitive b. Visual c. Supported with lower level employees within the organization d. Filled with internal and external data sources

c

28. Which of the following is not classified by breadth of support? a. Departmental b. Organizational c. Inter-company d. Inter-organizational

c

3. Technique to put data into context for easier consumption. a. Histograms b. Scatter Chart c. Data Visualization d. Line Chart

c

3. Which order demonstrates how IS Supports Business Processes bottom to top? a. Support business decision making, support of business processes and operations, support competitive advantage b. Support competitive advantage, support of business processes and operations, support business decision making c. Support of business processes and operations, support business decisions making, support competitive advantage d. Support competitive advantage, support business decision making, support of business processes and operations

c

4. ERP stands for: a. Expert Resource Planning b. Enterprise Resource Process c. Enterprise Resource Planning d. Expert Resource Process

c

4. Good decisions can _____________ impact an organization's bottom line. a. Negatively b. Inversely c. Directly d. Conversely

c

4. The process of converting a poorly structured table into two or more well-structured tables is called a. Database Design b. Multi-User Processing c. Normalization d. Database Management System

c

4. This is an example of a common Enterprise Resource Planning System. a. MS Word b. MS Access c. Oracle d. Customer Relations Management System

c

5. Vulnerability is: a. The intersection of Assets and Threats b. Both A and C c. A gap in our protection efforts d. What we are trying to protect

c

6. Which computer program is designed to support a specific task or a business process or another application program? a. Operating System b. Executive Information System c. Application Program d. Computer Operations Program

c

7. What is an example of a LEVEL ONE process model? a. Purchasing capital b. Requests c. Customer processes d. Maintenance

c

8. Users create the requirements for data entered into the database. Developers then convert those requirements into ______? a. Forms b. Reports c. Data models d. Relationships

c

8. What is the one of the main risks with IS security? a. Ability to manage from more than one location b. Tracking bank information c. Loss of Reputation and Money if hacked d. Keeping up with the competition.

c

8. Which of the following is NOT one of the three activities of Business Intelligence? a. Acquiring b. Publishing c. Computing d. Analyzing

c

8. Which of these is not a type of data? a. Master b. Transactional c. Megadata d. Metadata

c

19. Who is the top level manager of Information Systems in an organization? a. Chief Operations Officer b. Chief Computer Officer c. Chief Systems Officer d. Chief Information Officer

d

9. What Is Fuzzy Logic? a. Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. b. Attempts to emulate the way the human brain works. c. A mathematical method of handling imprecise or subjective information. d. Simulates human intelligence such as the ability to reason and learn.

c

1. The following are types of assets in data management except? a. Master Data b. Transactional c. Unstructured d. Combined

d

10. Converting data to information means what for a company? a. Optimize operations b. Control Quality c. Understanding Buying Behaviors d. All of the Above

d

10. Which of the following is not a problem posed by information silos? a. Data duplication b. Inconsistency c. Scheduling conflicts d. Retention Rates

d

11. What is Project Management? a. Supervising the progression of a project. b. Managing your team so they are working towards the completion of the project. c. Ensuring that the project phases are completed in the correct order. d. All of the above.

d

11. What is a major characteristic of a Transaction Processing System? a. The sources of data are mostly external b. High processing speed isn't necessary c. Hefty storage is not crucial d. High level of accuracy is needed

d

11. Which of the following are important rules of thumb with regards to data visualization? a. Who are you creating this for? b. What type of data are you using? c. Choose the correct scale. (So you do not mislead the audience) d. All of the above

d

12. A task is something that _____? a. Can be done by one person or a well-defined group b. Has a single and identifiable deliverable c. Has a known method or technique d. All of the above

d

12. The following symbol used to document a business process that indicates the beginning or ending of a process and links to other related processes. a. Process step b. Connector c. Square d. Terminator

d

12. This type of data management asset is based around sales, deliveries, invoices, trouble tickets, claims - any business event a. Unstructured b. Metadata c. Master Data d. Transactional

d

12. Which of the following is part of the management of information systems? a. Processes information systems and information b. Achieve strategies c. Management and use d. All the above answers

d

13. A value that identifies a unique row in a table: a. Key b. Alien key c. Foreign key d. Primary key

d

13. The project closedown phase includes all of the following actions except? a. Close down the project b. Conduct post-project reviews c. Close the customer contract d. Communicate the project status

d

13. What is not a component of the information system? a. Hardware b. Data c. Procedures d. Storage

d

13. Which of the following are types of charts? a. Histogram b. Bar Chart c. Pie Chart d. All of the above

d

13. Which of these is a server type? a. Network server b. Knowledge server c. Processing server d. Print server

d

14. Cybersecurity takes measures to protect data and systems related to _____. a. Information Technology b. Mainframes c. Desktop Computers d. The Internet

d

14. Which of the following is a component of the information system? a. Software b. People c. Procedures d. All of the above answers

d

14. Which of the following is not one of the components of an ERP System? a. Data b. Hardware c. Software d. Training

d

15. ERP stands for a. Excel Reinforcement Program b. Enterprise Resource Program c. Executive Representative Planner d. Enterprise Resource Planning

d

15. What are the characteristics associated with processes in organizations? a. Stability of flow b. Process scope c. Objectives d. All of above

d

15. What is included in the governance function of information systems? a. Capability assessment b. Risk management c. Oversee the delivery of value by IT to the business d. All the above answers

d

15. Which of the following is NOT one of the 3 activities of business intelligence? a. Acquiring b. Analyzing c. Publishing d. Deleting

d

16. Which of the following is a possible solution for information silos? a. EAI b. ERP c. HBO d. Both A and B

d

17. Top-down source of projects are typically identified by which group: a. Focus Group b. Development Group c. Lower Management d. Upper Management

d

18. Which of the following is not something done during application development? a. Gather data from all stake holders b. Testing c. Design software, database, and hardware selection d. Sell the product

d

19. The components of a DB application include all of the following except: a. Database b. DBMS (Database Management System) c. Database Application(s) d. Statistical Application(s)

d

19. Which variable can be divided? a. Discrete b. Eccentric c. Perishable d. Numerical

d

7. Which of these is not a cost of low quality information? a. Inability to accurately track customers b. Marketing to nonexistent customers c. Inability to build strong customer relationships d. Significantly improve the chances of making a good decision

d

8. Which of the following is the most important kind of feasibility study? a. Political b. Scheduling c. Operational d. Economic

d

9. Information silos arise as a result of ________. a. the individual users of personal information systems b. inter-enterprise information system's involvement to find solutions to problems arising within two or more enterprises c. an organization's plan to create them d. an organization's growth and increasing use of information systems

d

9. Which of the following are sources of data? a. TPS Systems b. Circuit Quality Systems c. Social Media Data d. Both A and C

d

9. Which of the following is not an important component of business processes? a. They have external users b. They have internal users c. The processes occur across organizations d. The processes occur only within organizations

d

9. Which of the following is recommended for continuous data? a. Histograms b. Bar Charts c. Line Charts d. B and C

d

Laptops d. All of the above

d


Conjuntos de estudio relacionados

Combo with "Psych Lesson 1" and 15 others

View Set

Maternal Newborn ATI 2019 Practice B

View Set

Week 4-Skeletal systems and joints

View Set

Bio 1 Final Old Test 4 Questions

View Set