CIS 310 Management Information Systems
Name 2 differences between RAM and hard disk:
1. Ram can transfer data much faster than the hard disk 2. Hard disk is used for long-term data storage, whereas RAM data is lost once the computer is turned off
What are the advantages of solid-state drives over hard disk?
-Instead of spinning disks, the SSD uses flash memory, which is much faster -The use of flash memory makes them much lighter and faster than hard disks -SSDs are primarily utilized in portable computers, making them lighter and more efficient
Which of the following jobs can be an administrative support function for a company? a. Computer operator b. Help desk administrator c. Database administrator d. All of the above
All of the above
In what year were restrictions on commercial use of the Internet first lifted? When were eBay and Amazon founded?
1991, 1994
How heavy was the first commercially successful portable computer?
28lbs
Which of the following is NOT a substitute for a car? a. A bicycle b. A hybrid vehicle c. A train d. A bus
A hybrid vehicle
What is ISO 9000 certification?
A certification for best practices
What is a Local Area Network?
A network that connects a group or organization in a small geographic region
What is the definition of a process?
A series of steps undertaken to achieve a desired outcome or goal
What is the benefit of ERP? a. It helps to standardize business processes b. It has best-practices in process management built into it c. Having a centralized database helps eliminate the need for data entry and reduces errors d. All of the above
All of the above
Which describes the role of a systems analyst? a. Translate the systems requirements into an information systems design b. Work with people, teams, and departments to determine what the business requirements are c. Document business processes d. All of the above
All of the above
Which of the following is not part of the security triad? a. Confidentiality b. Integrity c. Availability d. Accessibility
Accessibility
Describe the job of a project manager. a. Lead the project, keeping it on time and within budget b Report to upper management and the project team. Communicate constantly c. Work with stakeholders to solve their IT problems. d. All of the above
All of the above
Enterprise Resource Planning (ERP) applications do what? a. Manage the data and business processes across a company b. Integrate different functional areas of a company c. Operate off a centralized database d. All of the above
All of the above
Just like a company, you can do things to ensure your recovery from a major problem (like your laptop crashing). What are some things you can do? a. Perform regular backups of your data b. Store your backup in a safe place c. Test your backup to make sure that it works d. All of the above
All of the above
Specifically, a strategic information system is one that attempts to do what? a. Deliver a product or service at low cost b. Deliver a differentiated product or service c. Enable innovation d. All of the above
All of the above
What are advantages of Business Process Management systems? a. Built in reporting b. Enforce best practices c. Enforce consistency d. All of the above
All of the above
What are some emerging roles in IT? a. Social media specialist b. Data / Business intelligence analyst c. Cloud computing specialist d. All of the above
All of the above
What are the characteristics of a relational database? a. Data is organized into tables b. Tables consist of a set of fields c. A record is the data for the set of fields in a table d. All the tables are related by one or more fields in common e. All of the above
All of the above
What is true about business processes? a. A business process is a process that is focused on achieving a goal for a business b. Processes are something that businesses go through every day in order to accomplish their mission c. Automation through technology helps make business processes more efficient and effective d. All of the above are true
All of the above are true
What is true about cloud computing? a. Information may be stored on a remote server b. Programs for running a company may be hosted on a remote server c. The infrastructure for running a company's computing assets can be rented as needed d. All of the above are true
All of the above are true
What is true about Web 3.0?
Also known as the semantic web, where users can ask questions on a browser and get intelligent information
What is a hotsite?
An alternative replica of a company's critical data center. If the primary site goes down, the alternative site is immediately brought online with no downtime experienced
What is a flattened organization?
An organization that has removed one or more layers of management, creating better communication and faster business processes
Which is NOT an example of application software? a. Candy Crush b. Microsoft Access Database c. Google Docs d. Android
Android
Which of the following is an operating system? a. Excel b. Chrome c. iTunes d. Android
Android
Why does Nicholas Carr claim IT Doesn't Matter?
Because information technology is so readily available and the software so easily copied, businesses cannot hope to implement these tools to provide any sort of competitive advantage
What items below are typical Web 2.0 activities? a. Word processing, PowerPoint, Spreadsheets b. Database programming c. Blogging, Social networking, Interactive Comments d. Online advertising
Blogging, social networking, interactive comments
This person aligns the plans and operations of the information systems with the strategic goals of the organization
CIO
According to Michael Porter, what is the definition of competitive advantage? a. Making more profit than competitors because of technological superiority b. Using technology to put other competitors out of business c. Creating and sustaining superior performance d. All of the above
Creating and sustaining superior performance
What does CRM stand for?
Customer Relationship Management
What is Big Data?
Data sets that are so large, they cannot be analyzed by conventional database tools
Which of the following is a semi-structured decision? a. Ordering inventory when a part is out of stock b. Hiring temporary workers during the holidays c. Diagnosing a medical condition d. Purchasing stock once it falls below a certain price
Diagnosing a medical condition
What is one of the criticisms of ERP systems?
ERP systems are inflexible
Which of the following is NOT an advantage of outsourcing? a. Reduce cost b. Flexible labor pool in that it is easier to hire and fire outsourced labor c. Easily negotiated contracts d. Access to specific skills that a company may not already have
Easily negotiated contracts
What is meant by "matrix organization"?
Employees have two managers, a functional manager and a project manager
What is the productivity paradox?
Even though we've added information technology to business, it has not improved productivity. Yet, we cannot think of operating a business without technology
What can prevent suspicious packets from entering a company network?
Firewall
Which of the following is not an operating system? a. Google b. Windows c. Android d. iOS
What are the 5 components that make up an information system?
Hardware, software, data, people, process
Which term best describes this number: (909)999-2121? a. Data b. Information c. Knowledge d. Wisdom
Information
On the curve of technology adoption, who are the users that are first to adopt a new technology?
Innovators
What does Electronic Data Interchange (EDI) do?
Integrates the supply chain technology, so that business partners share documents and information regarding production
Which of the following is a BAD primary key? a. Social security number b. Email c. Last name d. Phone number
Last name
What is an example of an open source software
Linux
What does the term authentication mean? a. Making sure someone using the computer is who they say they are by use of passwords and other techniques b. Making sure data is accurate c. Making sure that data is kept confidential, so only the owner of the data can see it d. All of the above
Making sure someone using the computer is who they say they are by use of passwords and other techniques
Which of the following is a primary activity on the value chain? a. Human resources b. Firm infrastructure c. Procurements d. Marketing and sales
Marketing and sales
What is application software?
Microsoft Excel, Angry Birds
Microsoft Windows is an example of which component of information systems?
Operating System software
What are the two main types of software?
Operating systems and Application software
What was invented first, the PC or Internet?
PC
What does off-the-shelf mean, regarding information systems?
Purchasing a system that has already been built
Which of the following is not a network security tactic? a. Firewalls b. Intrusion Detection Systems c. Physical Security d. Remote storage of backups
Remote storage of backups
What is the definition of a process? a. Series of steps undertaken to achieve a desired outcome or goal b. continuous improvement c. Programming logic d. All of the above
Series of steps undertaken to achieve a desired outcome or goal
What was revolutionary about Web 2.0?
Social media websites such as Twitter, Facebook, and Wordpress allowed people to find and communicate with each other
Who invented the World Wide Web?
Tim Berners-Lee
Who is considered the inventor of the World Wide Web?
Tim Berners-Lee
Which of the following is a secondary activity on the value chain? a. Inbound logistics b. Technology Development c. Operations d. Outbound Logistics
Technology Development
In 2011, access to broadband was considered a basic human right by _________.
The United Nations
What were the first 4 locations hooked up to the Internet (ARPANET)?
UCLA, Stanford, MIT, University of Utah
Which of the following is NOT a way to help with password protection? a. Use a complex password b. Change your password regularly c. Use the same password for multiple web sites and computing systems d. Train people on how to create a good password
Use the same password for multiple web sites and computing systems
Antivirus software and disk defragmentation software are examples of what type of software?
Utility software
What does a document management system (DMS) control?
Versions, Approval, and Communications
What is an VPN and why is it useful?
Virtual Private Network, for employees outside of the firm to securely access the network
Which of the following is NOT an advantage of cloud computing? a. Installation and upgrades are handled by the cloud supplier b. You can get access to your cloud information from any computer connected to the Internet c. Your information is stored on someone else's computer d. Services can be leased for a limited time on an as-needed basis
Your information is stored on someone else's computer
What is a domain name?
a human-friendly name that corresponds to an IP address
What are the functions of the operating system? a. Manage the hardware resource of the computer b. Provide the user interface components c. Provide a platform for developers to write software applications d. all of the above
all of the above
What does an ERP system do? a. It offers integration of functions across organizations b. It uses a central database c. It reduces errors because the system is integrated d. all of the above
all of the above
What roles do people play in information systems? a. people run/operate information systems b. people use information systems c. people build information systems d. all of the above
all of the above
Which of the following are examples of application software? a. Word b. Google Docs c. Candy Crush d. All of the above
all of the above
Why is the personal computer now considered a commodity? a. it is part of our everyday lives b. there is very little differentiation between computers c. hundreds of manufacturers, worldwide produce parts for computers d. all of the above
all of the above
What does the term "killer app" mean?
an application that is so essential, people will buy the device to run it
What are the 3 examples of information systems hardware? a. computer, laptop, iPad b. printer, keyboard, mouse c. server, router, cables d. all of the above
all of the above
What roles do people play in information systems?
help desk, systems analyst, programmers, CIO
The CPU can also be thought of as the _______ of the computer.
brains
In general, the Internet has __________ bargaining power of customers. a. increased b. decreased c. not changed d. eliminated
increased
What is Carr's main argument about information systems?
information technology is a commodity and should be managed to reduce costs
What are examples of information systems hardware?
computers, keyboards, disk drives, iPads, flashdrives
What is cloud computing?
computing that is Internet based. It can be applications, services, and data storage
Which of the following is an example of qualitative data? a. units sold b. net profit c. the number of customer complaints d. content of customer complaints
content of customer complaints
What is metadata?
data about data
The goal of many information systems is to transform data into _______ in order to generate _______ that can be used for decision making. a. digital, information b. information, knowledge c. knowledge, questions d. reports, graphs
information, knowledge
Software that you purchase ___________. a. is owned by you b. is leased by you for a given period of time c. is not owned by you, but you have bought the license to use it d. all of these are interchangeable
is not owned by you, but you have bought the license to use it
What is Carr's main argument about information technology?
it has become a commodity. Instead of viewing technology as an investment that will make a company stand out, it should be seen as something like electricity; to be managed to reduce costs, ensure that it is always running, and be as risk-free as possible
What is role-based access control?
it is used to give users with specific characteristics (roles) different levels of access to information
What is multi-factor authentication?
it requires a user to log in (authenticate) with more than one type of identification
Which list below shows the terms ordered from smallest to largest? a. megabyte, kilobyte, terabyte, gigabyte b. gigabyte, megabyte, kilobyte, terabyte c. kilobyte, megabyte, gigabyte, terabyte d. megabyte, kilobyte, gigabyte, terabyte
kilobyte, megabyte, gigabyte, terabyte
List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz
kilohertz, megahertz, gigahertz
According to our author(s) what is the simplest way to document a process?
make a simple list of each step in the process
Which of the following is NOT a data type? a. number b. name c. text d. date
name
Microsoft Windows is an example of which component of information systems? Select the most appropriate answer. a. software b. application c. operating system d. user interface
operating system
What do rows and columns on a table (showing names of students, their major, and birthdate) represent, respectively? a. fields and records b. fields and data c. records and fields d. data and records
records and fields
Describe what the term normalization means
reduces duplication of data between tables
The Internet began in:
the 1960s
What does the term "packet" mean?
the fundamental unit of data transmitted over the Internet
What does it mean to say we are in a post-PC world?
the increased use of tablets and smartphones is putting us in a new era of computing
What is the bus of a computer?
the motherboard; "bus" refers to the electrical connection between different computer components
What is the impact of Moore's Law on the various hardware components described in this chapter?
the number of transistors on a chip will double every 2 years
What is the impact of Moore's Law on the various hardware components described in this chapter?
the number of transistors on a chip will double every 2 years; computing power will double every two years for the same price point
What are the advantages of solid-state drives over hard drives?
they use flash memory which is much faster than a traditional disk drive