MIS 2223 Exam 3 Quiz questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is another term for a JAD session? (Ch 11)

focus group

Data analysis certifications often contain the word ______ in their title. (Ch 12)

forensics

A(n) ______ database stores data in tables that consist of rows and columns. (Ch 11)

relational

In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup. (Ch 11)

rollforward

Why would a field that contains numbers have a text data type? (Ch 11)

Because the values will not be used in calculations.

Also known as BSN, is a type of PAN that wirelessly connects sensors worn by, carried by, implanted in, or attached to a human body. (Ch 10)

Body area network (BAN) or body sensor network (BSN)

A Yes/No data type also is called ______. (Ch 11)

Boolean

The drive from which your personal computer starts, which typically is an internal hard drive, such as a hard dick or SSD (Ch 9)

Boot Drive

Gracie is trying to decide between Windows or macOS for her new desktop computer. Since you have desktops that run both at home, she asks you for advice. She asks you what types of program are Safari and Edge. You tell her that these are ______. (Ch 9)

Browsers

Which of the following is NOT an advantage of the database approach? (Ch 11)

Eliminates redundant data

Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems. (Ch 9)

Embedded

Which of the following best describes the users of a VPN? (Ch 12)

Employees who work in other locations or who telecommute

Network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted (Ch 10)

Ethernet

QBE stands for query by ______. (Ch 11)

Example

Using a network, people communicate efficiently and easily via email, IM, chat rooms, blogs, wikis, online social networks, video calls, online meetings, videoconferences, VoIP, texts and more. (Ch 10)

Facilitate communications

What are the five advantages of a network? (Ch 10)

Facilitating communications, sharing hardware, sharing data and information, sharing software, transferring funds.

A DMS typically includes a CMS. (Ch 12)

False

A back end is a program that generally has a more user-friendly interface than the DBMS. (Ch 11)

False

A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases. (Ch 12)

False

A hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices. (Ch 12)

False

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. (Ch 11)

False

A relational database can store more than two dimensions of data. (Ch 11)

False

An SFA information system is used in product development. (Ch 12)

False

An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image. (Ch 11)

False

Apps designed for a specific mobile platform or device generally will work on another without significant modification. (Ch 12)

False

Because of convergence, as well as the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar. (Ch 9)

False

Continuous backup is inexpensive because the data is constantly being backed up. (Ch 11)

False

Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field. (Ch 12)

False

Eight bytes grouped together form a bit. (Ch 11)

False

Experts recommend that you run multiple antivirus programs simultaneously. (Ch 9)

False

FIP addresses concerns regarding security of information protocols. (Ch 11)

False

File processing systems require more memory and processing power than databases. (Ch 11)

False

HTML is a programming language. (Ch 11)

False

Many people initially used the term, data processing, to refer to the functions of a DMS. (Ch 12)

False

Most information gains value with time. (Ch 12)

False

Not all computer and mobile devices have an operating system. (Ch 9)

False

One advantage of ERP is complete integration of information systems across departments. (Ch 12)

False

Operating systems on embedded computers use a multitasking operating system. (Ch 9)

False

The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications. (Ch 12)

False

The kernel is an example of a nonresident instruction. (Ch 9)

False

The term, PC, sometimes is used to describe a computer that runs on a Mac operating system. (Ch 9)

False

When you use a credit card to purchase an item, you are interacting with a CMS. (Ch 12)

False

You should use a humorous name for your account profiles to ensure that you stand out to potential employers. (Ch 12)

False

A(n) ______ is the smallest unit of data a user accesses. (Ch 11)

Field

What is P2P file sharing sometimes called? (Ch 10)

File sharing network

______ is the operating system used by Amazon Kindle tablets. (Ch 9)

Fire OS

______ consists of ROM chips or flash memory chips that store permanent instructions. (Ch 9)

Firmware

Why is command-line interface considered difficult to use?

It requires exact spelling, form and punctuation

Which of the following best defines big data? (Ch 11)

Large-scale data sets that require advanced technologies

Gracie is trying to decide between Windows or macOS for her new desktop computer. Since you have desktops that run both at home, she asks you for advice. When describing the macOS interface, you tell her that she can use the ______ to view, organize, and run apps. (Ch 9)

Launchpad

(Server Operating Systems ex) Because it provides a secure, stable multiuser environment, it is often used on web servers and on supercomputers (Ch 9 Page 9-23)

Linux

A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, devices, and single-board computers. (Ch 9)

Linux

What is the operating system for Chrome OS base? (Ch 9 page 9-22)

Linux-based

A network that connects computers and devices in a limited geographical area (Ch 10)

Local area network (LAN)

Detailed analysis sometimes is called ______ design. (Ch 11)

Logical

What does LTE stand for? (Ch 10)

Long term evolution

A File ______ performs functions related to displaying and organizing files. (Ch 9)

Manager

A high-speed network that connects local area networks in a metropolitan area, such as a city or town. (Ch 10)

Metropolitan area network (MAN)

OneDrive is a cloud server from ______. (Ch 9)

Microsoft

OS on mobile devices and many consumer electronics, it also resides on firmware: (Ch 9)

Mobile operating system

Which of the following is NOT true about technology certifications? (Ch 12)

Most certification programs require academic coursework.

Allows two or more programs or apps to reside in memory at the same time: (Ch 9)

Multitasking operating system.

With a(n) ______ user interface, users interact with the software through ordinary, intuitive behavior such as touch, gesture, and voice. (Ch 9)

Natural

A collection of computers and devices connected together via communications devices and transmission media: (Ch 10)

Network

The person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. They also use the OS on the network to configure the network, install software, and administer network security. (Ch 9)

Network Administrator

The configuration of computers, devices, and media on a network is sometimes called what? (Ch 10)

Network architecture

Each computer or device on a network (Ch 10)

Node

Remains on a storage medium until they are needed, at which time they transfer into memory (RAM) (Ch 9)

Nonresident or nonresident instructions.

A(n) ______ is an item that contains data, as well as the actions that read or process the data. (Ch 11)

Object

Which data type sometimes is called BLOB? (Ch 11)

Object

How many tokens can exist per network? (Ch 10)

Only one

Android is what based mobile operating system? (Ch 9 Page 9-24).

Open source, Linux-based designed by Google.

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want to administer a network, you should look for jobs within the ______ area. (Ch 12)

Operations

Amount of data and program instructions that can be swapped at a given time: (Ch 9)

Page

Technique of swapping items between memory and storage: (Ch 9)

Paging

A program that assesses and reports information about various computer resources and devices (Ch 9 Page 9-11)

Performance Monitor

Network that connects computers and devices in an individual's workspace using wired and wireless technology (Ch 10)

Personal area network (PAN)

Which of the following best describes the role of a UX specialist? (Ch 12)

Plans and designs software and apps that consider a user's reaction to a program and its interface.

The operating system sometimes is called the ______. (Ch 9)

Platform

(TOOS) Privately owned and limited to a specific vendor or computer or device model: (Ch 9)

Proprietary software

This device accepts the transmission of data, instructions, or information (Ch 10)

Receiving Device

In situations when a boot disk is required to restart a computer or device, the book disk is referred to as ______ media. (Ch 9)

Recovery

Memory Resident: (Ch 9)

Remains in memory while the computer or mobile device is running.

Some operating systems allow users to control a network and administer security. (Ch 9)

True

The computer may run slower while is uses virtual memory (Ch 9)

True

The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs. (Ch 11)

True

The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. (Ch 11)

True

The trend is toward device-independent operating systems. (Ch 9)

True

To assist with sound decision making, information must have value. (Ch 12)

True

Unlike a form, you use a report writer only to retrieve data. (Ch 11)

True

Virtualization is the practice of sharing or pooling computing resources, such as servers or storage devices. (Ch 9)

True

When an organization uses the database approach, many programs and users share the data in the database. (Ch 11)

True

When you purchase a computer or mobile device, it usually has an operating system and other tools installed. (Ch 9)

True

You can use LinkedIn to follow companies to stay informed of their job opportunities. (Ch 12)

True

macOS is a UNIX-based operating system. (Ch 9)

True

(Server Operating Systems ex) Capable of handling a high volume of transactions in a multiuser environment and working with multiple processors. (Ch 9)

UNIX

A multitasking operating system developed by Bell Labs: (Ch 9)

UNIX

(TOOS) The OS may or may not run on newer versions of an OS: (CH 9)

Upward compatible

______ information has meaning to the person who receives it. (Ch 12)

Useful

Controls how you enter data and instructions and how information is displayed on the screen. (Ch 9)

User Interface (UI)

Which of the following best describes the principle of least privilege? (Ch 11)

Users' access privileges are limited to the lowest level necessary perform required tasks.

Which of the following jobs might use Google Cardboard to create storytelling tools? (Ch 12)

VR engineer

______ compares data with a set of rules or values to determine if the data meets certain criteria. (Ch 11)

Validation

______ information can be proved as correct or incorrect. (Ch 12)

Verifiable

A(n) ______ machine enables you to install a second operating system on a computer. (Ch 9)

Virtual

An environment on a computer in which you can install and run an operating system and programs. (Ch 9)

Virtual Machine (VM)

The operating system allocates a portion of a storage medium, such as a hard drive or a USB flash drive, to function as additional RAM. Computers may slow down while it uses this os. (Ch 9)

Virtual Memory

A(n) ______ engineer develops AI-based machines and programs. (Ch 12)

cognitive

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that a(n) ______ check verifies that a required field contains data. (Ch 11)

completeness

A(n) ______ database is a huge database used to analyze transactions. (Ch 11)

data warehouse

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats. (Ch 11)

visualization

An LAN that uses no physical wires (Ch 10)

wireless LAN (WLAN)

Which of the following is NOT true about DSSs? (Ch 12)

A DSS uses data only from internal sources.

Which of the following best describes the function of a TPS? (Ch 12)

A TPS captures and processes data from business activities.

Which of the following is NOT true about OOP languages? (Ch 11)

A disadvantage of OOP is that you cannot reuse or modify existing objects.

______ information is available when the decision maker needs it. (Ch 12)

Accessible

______ information is error free. (Ch 12)

Accurate

Which of the following best describes the function of an MIS? (Ch 12)

An MIS captures and processes data from business activities.

Which of the following best defines the term cross-platform application? (Ch 9)

An application that runs the same way on multiple operating systems

All of the following are examples of desktop operating systems EXCEPT ______. (Ch 9)

Android

Google Play is an example of a(n) ______. (Ch 9)

App Store

Feature that regularly provides new features or correcions to the program: (Ch 9)

Automatic Update

(TOOS) This OS can recognize and work with applications written for an earlier version of the OS (or platform): (Ch 9 Page 9-17)

Backward compatible

You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that by spooling documents to a(n) ______, the computer or mobile device can continue interpreting and executing instructions while the printer prints. (Ch 9)

Buffer

Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web? (Ch 12)

CMS

Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities. (Ch 11)

Charts

A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value. (Ch 11)

Check digit

One or more computers act as a server and the other computers on the network request services from the server.

Client/server

What are two examples of network architecture? (Ch 10)

Client/server, peer-to-peer

Other computers and mobile devices on the network that rely on the server for its resources. (Ch 10)

Clients

Some web databases are ______ databases, where users store and share media with other registered users. (Ch 11)

Collaborative

A user types commands represented by short key words or abbreviates, or press special keys on the keyboard to enter data and instructions: (Ch 9)

Command-line interface

Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents? (Ch 12)

Computer security incident responder

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job? (Ch 12)

Configure routers and firewalls

Which of the following is NOT one of the three general guidelines for system development? (Ch 11)

Create documentation The three are: 1. Group actives or tasks into phases 2. involve users 3. define standards

Which type of system's primary function is to store and manage a company's documents in a central library? (Ch 12)

DMS

Complete operating system (OS) that works on desktops, laptops, and some tablets. (Ch 9)

Desktop operating system or stand-alone operating system or client operating system

What are the three basic categories of an operating system? (Ch 9)

Desktop, server, and mobile.

Which of the following MIS reports usually lists just transactions? (Ch 12)

Detailed

(TOOS) Today's trend. OS that run on computers and mobile devices provided by a variety of manufacturers: (Ch 9)

Device-independent

A data ______ contains data about each file in the database and each field in those files. (Ch 11)

Dictionary

Describes a process in which two or more computers or devices transfer data, instructions, and information (Ch 10):

Digital communications

On computers running macOS, the ______ contains icons used to run apps, display minimized windows, and access documents. (Ch 9)

Dock

You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you replace your printer with a new one, you will have to install a(n) ______ to your computer. (Ch 9)

Driver

A small program that tells the operating system how to communicate with a specific device. (Ch 9)

Driver (short for device driver)

Many programs today use ______ on a webpage as their front end. (Ch 11)

Forms

You interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands: (Ch 9)

Graphical User Interface (GUI)

Two types of operating system user interfaces are: (Ch 9)

Graphical and command line.

Which of the following is responsible for answering technology-related questions? (Ch 12)

Help desk technician

During which phase of system development would you develop any necessary programs and apps? (Ch 11)

Implementation

Which of the following is NOT true about use of unlicensed software? (Ch 12)

In most cases, the software owner can make as many copies as desired.

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job? (Ch 12)

Inspect electronic data to recover documents and files

Which of the following best describes the role of a CRM specialist? (Ch 12)

Integrates apps and data to provide an application that manages a company's relationships with customers.

______ data is stored in separate files in different departments. (Ch 11)

Isolated

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______. (Ch 11)

It deleted logically

Initiates instruction to transmit data, instructions, or information: (Ch 10)

Sending device

The three parts of digital communication (Ch 10)

Sending device, transmission media, and receiving device.

Controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data and information (Ch 10)

Server

A multiuser operating system that organizes and coordinates how multiple users access and share resources on a network. (Ch 9)

Server operating system

Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software. (Ch 9)

Service Pack

Many software makers provide free downloadable updates, to users who have registered, and/ or activated their software: (Ch 9)

Service Pack

Any authorized user can access data and information stored on a network (Ch 10)

Share data and information

Each computer or device on a network can be provided access to hardware on the network (Ch 10)

Share hardware

Users connected to a network can access software on the network. (Ch 10)

Share software

Which of the following is NOT an activity in the implementation phase? (Ch 11)

Solicit vendor proposals

Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs. (Ch 12)

Specialist

The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer. (Ch 9)

Spooling

What can a desktop operating system sometimes be called? (Ch 9)

Stand- alone operating system or client operating system.

A mobile ______ integrates and expands the company's initiatives for mobile users. (Ch 12)

Strategist

Which of the following MIS reports usually includes tables and graphs? (Ch 12)

Summary

The area of the hard drive used for virtual memory is called a(n) ______ file. (Ch 9)

Swap

Are of the hard drive used for virual memory. it exchanges data, information and instructions between memory and storage: (Ch 9)

Swap File

Which of the following is responsible for designing and developing information systems? (Ch 12)

Systems analyst

Network protocol that defines how messages (data) are routed from one end of a network to another. (Ch 10)

TCP/IP

In some database programs, a data file is referred to as a(n) ______. ( Ch 11)

Table

In some database programs, a data file is referred to as a(n) ______. (Ch 11)

Table

Which of the following serves as an interface between programmers/developers and management? (Ch 12)

Technical project manager

The care of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources such as; devices, programs, apps, data, and information. It is also a memory resident. (Ch 9 page 9-4)

The Kernel

What happens if your computer or mobile device uses up its available RAM? (Ch 9)

The operating system may use virtual memory.

Which of the following is NOT true about network security? (Ch 9)

The operating system on a network does not record unsuccessful sign-in attempts.

What is meant by the term Plug and Play? (Ch 9)

The operating system that automatically configures new devices as you install or connect them

Which of the following best describes paging? (Ch 9)

The technique of swapping items between memory and storage.

When an operating system spends much of its time paging, instead of executing application software: (Ch 9)

Thrashing

When an operating system spends much of its time paging, it is said to be ______. (Ch 9)

Thrashing

______ information is useful only within a specific time period. (Ch 12)

Timely

Which of the following best describes the function of a primary key? (Ch 11)

To uniquely identify each record in a file

Special series of bits that function like a ticket. The device that has this can transmit data over the network (Ch 10)

Token

Standard specifies that computers and devices on the network share or pass a special signal in a unidirectional manner and in a present order. (Ch 10)

Token Ring

Also called Electronic funds transfer (EFT), this allows users connected to a network to exchange money from one account to another vis transmission media (Ch 10 page 10-4)

Transfer funds

Also called communication channel, on which the data, instructions, or information travel (Ch 10)

Transmission Media

A composite key consists on multiple fields. (Ch 11)

True

A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format. (Ch 11)

True

A queue is the lineup of documents waiting to be printed. (Ch 9)

True

Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app. (Ch 11)

True

Bloggers use CMSs to post to their blogs and provide categories to posts. (Ch 12)

True

CISSP is an example of a security certification. (Ch 12)

True

Census records, stock values, and corporate sales data is structured. (Ch 11)

True

Client operating systems operate with or without a network (Ch 9 Page 9-17)

True

Database software is another term for a DBMS.

True

Database software is another term for a DBMS. (Ch 11)

True

Diagnostic software included with a computer or device assists technicians in identifying problems. (Ch 12)

True

Dice and Monster are examples of career planning websites and apps. (Ch 12)

True

Expert systems are a component of artificial intelligence. (Ch 12)

True

Geofencing enables your phone to send or receive notifications when you enter or exit a geographic location. (Ch 9)

True

Human resources is an example of a functional unit. (Ch 12)

True

IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems. (Ch 12)

True

If thrashing occurs, try to exit the program. If that does not work, try a warm boot and then a cold boot. (Ch 9)

True

In a typical file processing system, each department or area within an organization has its own set of files. (Ch 11)

True

Inference rules are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system. (Ch 12)

True

Information systems support daily, short-term, and long-range information requirements of users in a company. (Ch 12)

True

Mobile web apps are actually websites that provide a user experience similar to native apps. (Ch 12)

True

Most TPSs use OLTP because users need information immediately. (Ch 12)

True

Which of the following best describes jailbreaking? (Ch 12)

When a user makes unauthorized modifications to a device's operating system.

Network that covers a large geographic area using wired and wireless transmission (Ch 10)

Wide area network (WAN)

(Server Operating Systems- ex) Developed by Microsoft, this server enables organizations to manage applications and websites on-site and or on the cloud: (Ch 9 Page 9-23)

Windows Server

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together. (Ch 12)

information

A(n) ______ translates and executes one instruction at a time and converts it to machine language. (Ch 11)

interpreter

(Server Operating Systems ex) Developed by Apple, this server enables organizations to collaborate, share files, host websites, and mail servers. (Ch 9)

macOS Server

File ______ refers to the procedures that keep data current. (Ch 11)

maintenance

CAM and MRP are examples of information systems used in ______. (Ch 12)

manufacturing

Cisco certifications that test knowledge of installing, configuring, operating, and administering ______. (Ch 12)

networks


Conjuntos de estudio relacionados

general insurance quiz questions

View Set

Art 1113 Chapter 2.7 Visual Communication

View Set

Post learning assessment chapter 7 APES

View Set

Antepartum Questions NCLEX Style

View Set

II Lecture Chapter 17 Multiple Choice and True False Quiz

View Set

Compensation and Benefits, Chapter 13: Benefit Options

View Set