management information systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

During which era did mainframe computers become a way to perform efficient calculations? a. Late 1950s to 1960s b. Mid 1960s to late 1970s c. Early 1970s to late 1980s d. Mid 1970s to early 1980s

a. Late 1950s to 1960s

Which stage of the data mining lifecycle is focused on understanding the issue and domain environment at hand? a. Problem definition b. Creating the database c. Exploring the database d. Preparation for creating a data mining model

a. Problem definition

Which of the following components contributes to the speed of a computer? a. RAM b. Hard Disk c. Solid state drives d. Input and output cables

a. RAM

Which of the following is an example of qualitative data? Select one: a. The color of a car. b. The number of cars sold. c. The average temperature in January. d. The count of students in a classroom.

a. The color of a car.

What is a disadvantage of cloud computing? Select one: a. Users need Internet access to be able to use the cloud. b. There is no software to install or upgrades to maintain. c. Cloud computing can scale to a large number of users easily. d. Information is lost if the hard disk crashes or the device is stolen.

a. Users need Internet access to be able to use the cloud.

In early computing, the information systems function was often referred to as the ___________ function of an organization a. data processing b. human resources c. marketing d. telecommunications

a. data processing

In early computing, the information systems function was often referred to as the ___________ function of an organization Select one: a. data processing b. human resources c. marketing d. telecommunications

a. data processing

The process of encoding data upon its storage or transmission is called: a. encryption. b. access control. c. authentication. d. public key infrastructure.

a. encryption.

EDI can be thought of as the exchange of business documents: a. from computer to computer. b. from computer to employee. c. from customer to computer. d. from employee to computer.

a. from computer to computer.

EDI can be thought of as the exchange of business documents: Select one: a. from computer to computer. b. from computer to employee. c. from customer to computer. d. from employee to computer.

a. from computer to computer.

One of the advantages of mobile learning for future generations of children is that: a. games can teach multiple subjects. b. children will no longer require interaction with teachers. c. children will receive partial credit towards an education. d. foreign countries can eliminate the need for physical classrooms.

a. games can teach multiple subjects.

eBay and Amazon were two of the first online e-commerce sites. Both online retailers were established in what year? a. 1993 b. 1994 c. 1996 d. 1997

b. 1994

The first personal microcomputer came out in 1975 and was featured on the cover of Popular Mechanics. What was the name of this microcomputer? a. Apple I b. Altair 8800 c. Mark-8 d. Nascom 2

b. Altair 8800

Which of the following is a fourth-generation programming language? Select one: a. BASIC b. Clipper c. COBOL d. Pascal

b. Clipper

Which of the following activities in support of the value chain includes organizational functions such as finance and accounting? a. Data warehousing b. Firm infrastructure c. Technology development d. Human resource management

b. Firm infrastructure

The ability to take your work anywhere via smartphone or tablet is an example of what advantage of cloud computing? a. Flexible capacity b. Improved mobility c. Virtual environment d. Improved collaboration

b. Improved mobility

The ability to take your work anywhere via smartphone or tablet is an example of what advantage of cloud computing? Select one: a. Flexible capacity b. Improved mobility c. Virtual environment d. Improved collaboration

b. Improved mobility

Which of the following advantages does closed source software have over open source software? a. Patches and additional features are available free. b. Application code can be reviewed before you install it. c. The company that developed the software offers technical support. d. More closed source applications exist for mobile apps than open source applications.

c. The company that developed the software offers technical support.

What is knowledge mapping (or concept mapping)? Select one: a. The process of systematically retrieving data from a data warehouse. b. Understanding the online location of the knowledge needed for competitive advantage. c. Understanding who in the company has the knowledge needed for competitive advantage. d. Understanding the geographical location of the knowledge needed for competitive advantage.

c. Understanding who in the company has the knowledge needed for competitive advantage.

The _______________ divide is concerned with the fact that, for some groups of people, new technology is so alien and difficult to accept that many people would never learn how to use the technology, even if it were made freely available to them. Select one: a. Culture b. Economic c. Usability d. Virtual

c. Usability

What "killer" spreadsheet application was the first of its kind to turn the microcomputer from a hobby to a major business tool in 1979? a. BYTE b. EasyWriter c. VisiCalc d. WordStar

c. VisiCalc

Application software is designed to do a specific task. Which of the following is an example of application software? a. Windows XP b. System Registry c. World of Warcraft d. HD Sector Boot Software

c. World of Warcraft

In database terminology, the "primary key" is which of the following? Select one: a. the name of the most used table. b. the password needed to open the database. c. a unique identifier for each record in a table. d. the name of the table that holds the key information.

c. a unique identifier for each record in a table.

HTML is used to define the components of a web page, and ___________ is/are used to define the styles of components. a. HTML5 b. interactive elements c. cascading style sheets d. the World Wide Web Consortium

c. cascading style sheets

Which of the following is an ethically unacceptable use of information systems? Select one: a. Sharing passwords with coworkers b. Reporting suspicious email to the network administrator c. Locking someone's computer to prevent unauthorized use d. Designing a system to deliberately demean an individual or group

d. Designing a system to deliberately demean an individual or group

Which of the following people would report directly to the Senior Director of IT in an organization? Select one: a. Operations Analyst lead b. Quality Assurance Manager c. Customer Relations Manager d. Testing and simulation project lead

d. Early majority; late majority

Which of the following is explicitly prohibited as part of the Association for Computing Machinery's code of ethics? a. Browsing a competitor's website b. Using a company computer to find another job c. Using a company computer after business hours d. Entering or using someone else's computer without permission

d. Entering or using someone else's computer without permission

In which era of globalization did fiber-optic Internet connections and software creat a "flat world platform"? a. Globalization 1.0 b. Globalization 2.0 c. Globalization 2.5 d. Globalization 3.0

d. Globalization 3.0

Which of the following is a strategy for using information technology for competitive advantage? Select one: a. Get ISO certified. b. Install an ERP system. c. Automate all processes. d. Implement business process management.

d. Implement business process management.

___________ assures information has not been altered in any unauthorized or unexpected way. a. Availability b. Confidentiality c. Integrated d. Integrity

d. Integrity

What workflow software allows people to work together in a global e-commerce solution? a. Form models b. User reassignments c. Document integrators d. Payment-processing systems

d. Payment-processing systems

One implication of the _______________ trend is that information systems will increasingly be able to serve users with targeted advertisements for products and services based on data collected from unique search patterns, device use patterns, and location. Select one: a. Autonomous b. Collaborative c. Mobile d. Personal

d. Personal

Which of the following is an example of information systems software? Select one: a. An Android phone b. A computer mouse c. The Internet d. The Windows operating system

d. The Windows operating system

Which of the following functions would you likely find in a database management system? Select one: a. The ability to play music. b. The ability to edit a video. c. The ability to detect a computer virus. d. The ability to change a database field's data type.

d. The ability to change a database field's data type.

This global economic trend identified in 1996 is an economy with the capacity to work in real time. Select one: a. The global firm b. The world is flat c. Globalization 1.0 d. The network society

d. The network society

Which of the following best describes data mining? Select one: a. The process of loading data into a data warehouse. b. The process of running a daily report from a database. c. The process of writing reports from several of an organization's operational databases. d. The process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions.

d. The process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions.

What should we focus on when considering the impact of a technology? Select one: a. The specific technology and its capabilities. b. Where it fits in the competitive forces model. c. How the technology can lower prices for everyone. d. The underlying technology platform and its impact on the business model.

d. The underlying technology platform and its impact on the business model.

What is the purpose of a certification? Select one: a. They are required for a promotion. b. They enable an employee to finish a project. c. They allow an organization to combine roles. d. They are designations given by a certifying body that someone has a specific level of knowledge in a specific technology.

d. They are designations given by a certifying body that someone has a specific level of knowledge in a specific technology.

What kind of programming language is more like a spoken language and is not hardware-specific? a. First-generation b. Fourth-generation c. Second-generation d. Third-generation

d. Third-generation

What is the purpose of a data dictionary? Select one: a. To hold the binary version of the data in the database. b. To allow the database to lookup words and substitute synonyms. c. To provide definitions of any complex words stored in the database. d. To hold the metadata that defines the fields and structure of the database.

d. To hold the metadata that defines the fields and structure of the database.

Which of the following trends for technology in the near future involves the use of physical object connectivity? a. Collaborative b. Findable c. Printable d. Wearable

d. Wearable

The physical component of information systems includes hardware like disk drives, flash drives, keyboards, and: a. power strips. b. computer desks. c. human operators. d. external hard drives.

d. external hard drives.

The physical component of information systems includes hardware like disk drives, flash drives, keyboards, and: Select one: a. power strips. b. computer desks. c. human operators. d. external hard drives.

d. external hard drives.

Which of the following IT roles maintains the software and hardware that other people in their company use each day to get their jobs done? Select one: a. IT Generalist b. Desktop Support c. Server Support/Systems d. Database Administration

Desktop Support

What is one of the greatest disadvantages to storing sensitive data on the cloud? a. Unlimited disk space b. Reliability of third party cloud security c. Services are leased on an as-needed basis d. Available from any device with an Internet connection

Reliability of third party cloud security

Which of the following is an example of information systems hardware? Select one: a. A laptop computer b. Information on a spreadsheet c. The Windows operating system d. The Chief Information Office (CIO)

a. A laptop computer

Intel and Advanced Micro Devices are examples of which computer component essential for its operation? a. CPU b. Hub c. RAM d. Router

a. CPU

RAM is installed in a computer through the use of a: a. DIMM. b. DNS. c. hard disk. d. motherboard

a. DIMM.

Which of the following is an example of system software? a. DOS b. Malware c. Firmware d. Mobile apps

a. DOS

Most generally, the software development processes always includes which of the following steps? Select one: a. Decide what to do b. Maintain and revise c. Patch and update d. Request feedback from customer

a. Decide what to do

Which of the following is a common use of metadata? a. Filter content based on values b. Describe attributes of an audience c. Categorize data based on granularity d. Filter content based on the environment

a. Filter content based on values

Which of the following presents the largest infrastructure challenges organizations face in globalization? a. Internet speed b. Sources of power c. Incompatible hardware d. Telecommunications and time zones

a. Internet speed

Which of the following best describes an ERP system? Select one: a. It is a software application with multiple databases that can be used to run an entire company. b. It is a software application with a centralized database that can be used to run an entire company. c. If is a software application with a centralized database that can be used to run financial functions for an entire company. d. It is a software application with a separate accounting database that can be used to run financial functions for an entire company.

b. It is a software application with a centralized database that can be used to run an entire company.

Which of the following best describes open source software? Select one: a. It allows users to make one personal backup at no charge. b. It is free to use for individuals who know how to do programming. c. It makes the source code available for anyone to copy and use for free. d. It can be used for free for a limited period of time, after which users must pay a fee.

b. It makes the source code available for anyone to copy and use for free.

Which software development methodology focuses on taking an initial idea and developing a minimum viable product (MVP) and includes the following major steps: build, measure, and learn? Select one: a. Agile b. Lean c. Rapid Application Development d. Waterfall

b. Lean

Which of the following is an advantage of cloud computing for business? a. Rigid cost structure b. Off-premises servers c. Opportunity to monetize d. Non-negotiable agreements

b. Off-premises servers

The main job duty of which of the following individuals is to oversee the initiation, design, and implementation of IT related projects? a. Functional manager b. Project manager c. Software engineer d. Systems analyst

b. Project manager

Which of the following is true about the relationship of the World Wide Web to the Internet? Select one: a. The Internet is one part of World Wide Web. b. The World Wide Web is one part of the Internet. c. The World Wide Web is separate from the Internet. d. The World Wide Web is a subset of VoIP which is a subset of the World Wide Web.

b. The World Wide Web is one part of the Internet.

Which of the following is an example of metadata? a. The location of a file b. The length of a formal title c. The last time a file was accessed d. The name of the person who last reviewed a file

b. The length of a formal title

An information systems process can best be described as: Select one: a. an exam that can be taken to receive a certification. b. a series of steps undertaken to achieve a desired outcome or goal. c. software that allows the user to accomplish some goal or purpose. d. a combination of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data.

b. a series of steps undertaken to achieve a desired outcome or goal.

One of the major advantages of a code of ethics is that it: Select one: a. legally binds employees to maintain workplace ethics b. clarifies the acceptable standards of behavior in an organization c. includes all important issues that may arise in any ethical situation d. provides the company with a legal reason to terminate any employee who violates it

b. clarifies the acceptable standards of behavior in an organization

Intellectual property is defined as any ___________, invention, or process that derives from the work of the mind or intellect. a. copy b. idea c. license d. project

b. idea

Information is data that has been interpreted and given: a. organization. b. meaning. c. number. d. words.

b. meaning

Access control limits what information a user is allowed to read, ___________, add, and delete. a. create b. modify c. observe d. save

b. modify

How did Wal-Mart use information systems to create a competitive advantage? Select one: a. By replacing employees with computers b. By automating processes to become more efficient c. By implementing a supply chain management system d. By providing personal computers to all of their employees

c. By implementing a supply chain management system

What does Moore's Law state? Select one: a. The more you use a software, the more you will come to like it. b. The power of software becomes more valuable the more people use it. c. Computing power will double every two years for the same price point. d. The usefulness of the network becomes more powerful as more nodes are added.

c. Computing power will double every two years for the same price point.

What is the impact of information technology on the bargaining power of customers? Select one: a. It has driven brand loyalty. b. It has helped suppliers find more customers. c. It has given customers more options to choose from. d. It has helped companies get lower prices from suppliers.

c. It has given customers more options to choose from.

According to Porter, what is the impact that the Internet has had, in general, on the profitability of industries? Select one: a. It has driven up prices. b. It has raised overall profitability. c. It has lowered overall profitability. d. It has made it more difficult for competitors to enter an industry.

c. It has lowered overall profitability.


Conjuntos de estudio relacionados

Bus Strategy: MGMT 498 CH 12 Quiz

View Set

Final Exam All Material, Final Exam New Material, Exam 4 All Questions, NUR 112 Exam 3 ALL QUESTIONS

View Set

سؤال وجواب في التاريخ الاسلامي

View Set

Business Law Chapter 13 Smartbook

View Set

personal finances module 1 study guide

View Set

404 Chapter Questions 10, 11, and 12

View Set

U.S. History II Final Exam Part II

View Set

Intro to Social Psych - Ch 11: Prosocial Behavior

View Set