INFM FINAL
What is incorrect about the difference between a spreadsheet and a database? List three differences between them. A database and a spreadsheet do not have any differences, just the vendor who developed the software. A database has defined field types, a spreadsheet does not. A database uses a standardized query language (such as SQL), a spreadsheet does not. A database can hold much larger amounts of data than a spreadsheet.
A database and a spreadsheet do not have any differences, just the vendor who developed the software.
What has been the overall impact of the Internet on industry profitability? An general increase in profitability of businesses. A general decrease in profitability of businesses. An increase in the cost of doing business. All of the above.
A general decrease in profitability of businesses.
What is an LAN? A network of computers across a metropolitan area A city area network, connecting computers across a metropolitan area A wide area network, connecting buildings of computers together, like a campus A local area network, connecting computers in a room or across a building
A local area network, connecting computers in a room or across a building
What is BPMN? A notation for BPR. A modeling language for business processes. A programming language similar to Java. A way to model decisions that managers make.
A modeling language for business processes.
What does the term packet mean? A packet, also called Ethernet packet, is the fundamental unit of information transmitted by the internet. A pack is the way to move extremely large files using physical hard drives, but a packet is a way to move small files. Packet is a business term referring to information moving through a business process. None of the above define the term packet with respect to the internet.
A packet, also called Ethernet packet, is the fundamental unit of information transmitted by the internet.
What is the definition of a process? A process is like a recipe. A process is a series of steps undertaken to achieve a desired outcome or goal. A process is like an algorithm. All of the above.
A process is a series of steps undertaken to achieve a desired outcome or goal.
Which statement is not true about a relational database? A relational database is one in which data is organized into one or more spreadsheets. Each table has a set of fields, which define the nature of the data stored in the table. A record is one instance of a set of fields in a table. All the tables are related by one or more fields in common.
A relational database is one in which data is organized into one or more spreadsheets.
What does the term business process mean? A series of tasks that automate a business function. A set of business functions associated with a division in the business, such as accounting or HR. A repeatable series of tasks that when completed accomplish a goal. A business procedure implemented in software for the computer to execute.
A repeatable series of tasks that when completed accomplish a goal
What is role-based access control? A user has at least one role in the company. The access for that user is based on access given to that role. As in acting, a user plays a role in a company, which puts the user at different positions in the company. Access control to a job can be role-based or preference based as seen in nepotism within a company. None of these define what role-based access control.
A user has at least one role in the company. The access for that user is based on access given to that role.
What does a software license grant? Access to use software, but not own it. A copy of the source code of the software. Evidence that a business has paid for the software. Ability for all employees in the company to use the software if the business has purchased a license.
Access to use software, but not own it.
What are three differences between second-generation and third-generation languages? 3GL use more English words. 3GL are easier to learn because they are more abstract 2GL tend to be platform specific; 3GL tend to be platform independent All of the above
All of the above
What does the CIO do? Aligns IT strategy to business strategy Allocates IT budget to support IT strategy Oversees HR for IT including hiring and training All of the above
All of the above
What does the term physical security mean? Locks on doors Guards at gates Video camera surveillance All of the above
All of the above
What is the value in documenting a business process? To make it repeatable by standardizing it More control of the process by collecting data as the process is executed Communicating the process to new employees and to a computer for automation using BPMN All of the above
All of the above
What is one of the criticisms of ERP systems? All businesses will have and use the same business processes as part of the ERP purchase. ERPs have high startup costs. ERPs create vendor lock in and are hard and expensive to train on. All of the above are criticisms of ERP systems.
All of the above are criticisms of ERP systems.
Why is it important to define the data type of a field when designing a relational database? The amount of storage space can be determined by knowing the data type of each field. The type of processing allowed can be determined by knowing the data type of each field. The data going into that field can be validated to prevent bad data from entering that field. All of the above are reasons why fields have data types.
All of the above are reasons why fields have data types.
What was Carr's argument in "Does IT Matter." IT has become a commodity, so the IT department should minimize costs and stabilize services. IT tends not to be a differentiator for a company. Early adopters of IT did appreciate a differentiation until all companies has similar IT. All of the above are true about Carr's argument.
All of the above are true about Carr's argument.
What was revolutionary about Web 2.0? The Web moved from being static to being dynamic. The Web became writable, not just readable. Huge numbers of people became authors. All of the above characterize Web 2.0.
All of the above characterize Web 2.0.
Explain why the personal computer is now considered a commodity. Computers became cheaper to buy than to repair. Computers no longer needed to be purchased with capital accounts. Computers are not the asset of the company any longer.
All of the above.
Which statement is false about mobile devices. Mobile devices include smartphones, smart watches, and smart glasses. Mobile devices attach to the internet with a wireless service. Mobile devices are just more compact computers. All statements about mobile devices are true.
All statements about mobile devices are true.
What does a collaborative information system do? Increases IT availability for the company. Collaborative information systems enable employees to compete with each other better. Allows two or more people to interact together on a topic or document to get something done. Allows a team to copy documents and distribute the copies in order to share them collaborative.
Allows two or more people to interact together on a topic or document to get something done.
Explain what is the best explanation of what an ERP system does? An ERP creates reports for managers. An ERP centralizes and gives access to all data across an organization. An ERP is expensive to buy and configure for an organization. An vendor example of an ERP is SAP.
An ERP centralizes and gives access to all data across an organization.
What is an ERP system? An ERP is a system that collects data about customer behavior and purchasing habits. An ERP is an extrasensory reporting plan to predict supplier value. An ERP is one centralized database and software system connecting all aspects of the business for end-to-end business functions. An ERP is a system that used to be popular in the 1980s and 1990s.
An ERP is one centralized database and software system connecting all aspects of the business for end-to-end business functions.
One of the first personal computers was the: Altair 8800 Apple II Windows 3.1 Microsoft
Apple II
Why would an organization consider building its own software application if it is cheaper to buy one? As a competitive advantage in the marketplace As a way to spend money before the end of the fiscal year As way to avoid vendor lock in None of the above
As a competitive advantage in the marketplace
What are the primary activities of the value chain? Activities that indirectly support the value chain such as human resources and IT. Inbound logistics, operations, outbound logistics, sales/marketing and service. Activities that directly support the creation of the product or service. B and C are both correct.
B and C are both correct.
Why would an organization outsource? Can cut cost of human resources Can raise cost of technology Can lower skillset of organization Can increase rate of Corona19 infection.
Can cut cost of human resources
What are the four different information systems implementation methodologies? Cutover, pilot, parallel, phased Innovators, early adopters, late adopters, lagers Waterfall, Incremental, Cyclical, Agile transaction processing systems, management information systems, decision support systems
Cutover, pilot, parallel, phased
What are the components of a good backup plan? Backing up regularly and not randomly Storing the backup off-site in case of physical destruction Practice restoring the backup to make sure it works Deciding what needs to be backed up, making regular backups, using offsite storage of all backed-up data, and a testing the restoration process
Deciding what needs to be backed up, making regular backups, using offsite storage of all backed-up data, and a testing the restoration process
Give an example of a semi-structured decision and explain what inputs would be necessary to provide assistance in making the decision. Deciding whether the fever is caused by Corona19 or the common flu. Deciding to bring in a temp when a worker is sick on the assembly line. Deciding on a strategic change for the company. Deciding to paint the bike red when the customer order specifies red
Deciding whether the fever is caused by Corona19 or the common flu.
How does EDI work? EDI is essentially systems integration to make them work together. EDI occurred before the advent of Enterprise Resource Planning (ERP) systems. EDI works by recompiling computer code to work across different computer systems. EDI is a communication layer that translates data to a common format as they move between different business partners, as in a supply chain.
EDI is a communication layer that translates data to a common format as they move between different business partners, as in a supply chain.
Describe what the term normalization means. Encourages data duplication thus makes records easier to update. Organizing data that is normally distributed. Eliminates data duplication thus makes records easier to update. Watching out for outliers in the data.
Eliminates data duplication thus makes records easier to update.
What is the oldest type of computer application software? Social media Text messaging Email Web browsers
What is pretexting? Sending a text message to a friend before they send a text message to you Faking someone else's identity when interacting with IT Encrypting the text ahead of time to protect the message Sending a virus into the system through the use of a text file.
Faking someone else's identity when interacting with IT
What are the advantages of solid-state drives over hard disks? Faster Slower Non-volatile Solid, not liquid
Faster
What impact has information technology had on the way companies are organized? Blow up the hierarchy Deepen the hierarchy Flatten the hierarchy Swirl the hierarchy
Flatten the hierarchy
What is RAD software development? Get a working model running then incrementally improve the model. Write the requirements and specification documents before starting to build the system. Add a new function and release the next version of the system every sprint. RAD stands for Radical Development to build only what is necessary for the business.
Get a working model running then incrementally improve the model.
What is the relationship between HTML and CSS in website design? HTML, CSS and Javascript are the three language of HTML5 HTML carries the data and CSS carries the format/style for displaying the data HTML and CSS are two network protocols like TCP and IP HTML is a 2GL and CSS is a 3G
HTML carries the data and CSS carries the format/style for displaying the data
What are the five types of information-systems users based on their adoption of technology? Children, Parents, Grandparents, Aunts and Uncles, Cousins Innovators, Early Adopters, Early Majority, Late Majority and Laggards Those who love technology and those who do not. Innovators, Early Adopters, Majority, Late Adopters, Never Adopters
Innovators, Early Adopters, Early Majority, Late Majority and Laggards
What are the duties of a computer operator? Strategic IT planning Operates the business processes running on the computing systems Installing upgrades, monitoring capacities and computing environment Like a phone operator, a computer operator provides customer services for computing
Installing upgrades, monitoring capacities and computing environment
What is software? Instructions to the computer to do a task. Instructions to the employee to do a task. Same as a business process. All of the above.
Instructions to the computer to do a task.
hat are the three members of the information security triad. Authentication, Authorization, Confidentiality Availability, Confidentiality, and Privacy Confidentiality, Integrity and Ethics Integrity, Confidentiality and Availability
Integrity, Confidentiality and Availability
Describe the job of a project manager. Keeps processes on time and on budget Keeps projects on time and on budget Works with members of the C-suite on all IT projects All of the above
Keeps projects on time and on budget
List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz. Megahertz, Kilohertz, Gigahertz Kilohertz, Megahertz, Gigahertz Megahertz, Gigahertz, Kilohertz Gigahertz, Megahertz, Kilohertz
Kilohertz, Megahertz, Gigahertz
What is not an advantage of centralizing the IT function? Centralizing control of computer systems Centralized data Limited local control of IT resources scattered within divisions of the organization None of the above are disadvantages
Limited local control of IT resources scattered within divisions of the organization
What is are the three function of the operating system? Manage hardware resources, provide capabilities to add hardware, provide user interfaces Manage hardware resources, provide capabilities to add software, provide network interfaces Manage software resources, provide capabilities to add software, provide user interfaces Manage hardware resources, provide capabilities to add software, provide user interfaces
Manage hardware resources, provide capabilities to add software, provide user interfaces
What is the best way to state Moore's Law? Computers get cheaper. The power of a computer (number of transistors in a CPU) doubles every two years. Something doubles ever two year. The power of a computer doubles every two year.
The power of a computer (number of transistors in a CPU) doubles every two years.
What is change management? A way to manage changes to competitors and their position in the market through organizational strategy. Management of employee turnover in an organization including training. How to version software in IT. The processes and policies that allow for and manage changes within the organization.
The processes and policies that allow for and manage changes within the organization.
Who invented the World Wide Web? Elon Musk Tim Berners-Lee Bill Gates ARPA
Tim Berners-Lee
What is the purpose of encryption? To scramble all of the information on the internet so increase the privacy of information. To make things harder to find on the internet, as in the dark web or the deep web. To increase the confidentiality of data by scrambling the data so that it can only be unscrambled by those who have the right key To decrease the availability of data
To increase the confidentiality of data by scrambling the data so that it can only be unscrambled by those who have the right key
Describe the role of a systems analyst. To translate the business requirements into the language that IT can understand and implement. To analyze the system purchased by the business to put it into production in the business To apply systems theory to analyzing the business needs within the competitive landscape. None of the above.
To translate the business requirements into the language that IT can understand and implement.
Two different ways of describing information systems are the components that make up an information system and the role those components play in an organization. True False
True
All are good ways to create a complex password except which one? Eight or more characters including at least one upper case, one lower case, one number and one special character Using a phrase instead of a word, as in golf-think-law-deploy Using the name of your first pet Using an autogenerated complex password
Using the name of your first pet
What does the term VoIP mean? Voting In Progress Voice over Internet Protocol Voice over TCP It is the sound that the bird called a Vo makes at night.
Voice over Internet Protocol
When would using a personal DBMS make sense? When you want to keep personal data of customers in the database management system. When the amount of data is small and the database will not be shared with others. When the database management system is a strategic and shared asset of the business. None of the above make sense.
When the amount of data is small and the database will not be shared with others.
What makes a connection a broadband connection? The connection has many sub-connections called bands. When the music appeals to a broad audience. When the throughput of the connection is large. When it costs a lot.
When the throughput of the connection is large.
What is multi-factor authentication? This is when factors are used, as in multiplication to solve a problem. When two or more independent authorizations are done in a sequence. When two or more independent authentications are done in a sequence. When authentication is done with at least a login and a password.
When two or more independent authentications are done in a sequence.
What university was not one of the first four locations hooked up to the Internet, then called ARPANET? UCLA Stanford MIT Yale
Yale
How heavy was the first commercially successful portable computer? about 5 pounds about 10 pounds about 200 pounds about 30 pounds
about 30 pounds
It has been suggested that a 4th technology component in addition to hardware, software and data should be: the Dark Web communication Web 2.0 The Internet of Things (IoT)
communication
What are three examples of information system hardware? computers, network wiring, keyboards computers, applications, monitors computers, operating systems, monitors tablets, computers, applications
computers, network wiring, keyboards
What was the so-called killer app for the Internet? email spreadsheets databases Facebook
What is the bus of a computer? motherboard fatherboard keyboard networking board
motherboard
What is business process management? BPM came before BPR and is no longer used today. BPM has replaced BPR by proactively planning, documenting, implementing and distributing business processes. BPM is as costly as ERP. None of the above describe BPM.
BPM has replaced BPR by proactively planning, documenting, implementing and distributing business processes.
What is business process reengineering? Blowing up the current business process and starting over from scratch to design a new one. Incrementally reengineering the process for better efficiency. Modeling and modifying the current process to engineer new ways for efficiency. None of the above are good definitions of BPR.
BPR was a fad that had more hype than substance.
The Central Processing Unit or "CPU" can also be thought of as the _______ of the computer. Feet Hand Brain Heart
Brain
How does the data component relate to the hardware and software components of information systems. Hardware stores the data. Software processes the data. Software stores the data. Hardware processes the data. Hardware and software participate equally with data. Data is more important than hardware and software.
Hardware stores the data. Software processes the data.
What are the five components that make up an information system? Hardware, Software, Business Intelligence, People, Production Hardware, Operating Systems, Data, Employees, Process Hardware, Application Software, People, Processing Hardware, Software, Data, People, Process
Hardware, Software, Data, People, Process
What are some of the different roles for a computer engineer? Hardware, Cloud, Network, Systems Hardware, Software, Communications, Systems Hardware, Software, Network, DevOps Hardware, Software, Network, Systems
Hardware, Software, Network, Systems
How can IT play a role in competitive advantage, according to the 2008 article by Brynjolfsson and McAfee? IT can play a role in competitive advantage when the computers and software are updated regularly and do not fall behind. IT can be a competitive advantage when there is good IT management that can deliver the services and deliver processes that support new innovation. IT cannot play a role in competitive advantage because IT is a cost center for the company.None of the above.
IT can be a competitive advantage when there is good IT management that can deliver the services and deliver processes that support new innovation.
How is the 2008 study by Brynjolfsson and McAfee different from previous studies? IT did not matter in 1991 study but did in 2008 study. The years of the study were difference but not the conclusions of the studies. There was low variability in the effect of IT on an organization trying to be differentiated. The effect of IT management was not significant on the outcomes generated by IT investments.
IT did not matter in 1991 study but did in 2008 study.
What is the productivity paradox? It was found that productivity and IT are not related, paradoxically. Paradoxically, IT doubled the productivity of businesses that invested in them before 1991. IT was supposed to help business' productivity, but it did not in early studies. Paradoxes in business are numerous and are still being investigated.
IT was supposed to help business' productivity, but it did not in early studies.
How did the Y2K (year 2000) problem affect the sales of ERP systems? De-incentivized the purchase decisions by businesses to buy an ERP because of the date problem. ERP sales plummeted in the year 2000. The sales of ERP systems leveled off on or around the year 2000. Incentivized the purchase decisions by businesses to buy and install an ERP.
Incentivized the purchase decisions by businesses to buy and install an ERP.
What does the term authentication mean? That the person has a login and a password that works. That the person is who they say they are. That the person is authorized to in the system. That the person has a security clearance.
That the person is who they say they are.
What is metadata? Metadata consists of the actual data values in the fields of the records stored. Metadata is data about data that characterizes that data. Metadata means millions of data points, where Gigadata is billions of data points. None of these are true about metadata.
Metadata is data about data that characterizes that data.
What is Metcalfe's Law? Metcalfe's Law states that the number of transistors in a computer doubles every two years. Metcalfe's Law states that a person is limited to 150 stable relationships at any one time. Metcalfe's Law states that a person can keep 7, plus or minus two things in their head at any given time. Metcalfe's Law states that the value of a network is related to the square of the number of connections in the network.
Metcalfe's Law states that the value of a network is related to the square of the number of connections in the network.
Which of the following are application software and not operating systems? Microsoft Excel, Google Chrome, iTunes, Angry Birds. Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds. Google Chrome, iTunes, Windows, Android, Angry Birds. Windows, Android.
Microsoft Excel, Google Chrome, iTunes, Angry Birds.
What makes the lean methodology unique? Not all of the system requirements are known before starting the project. All of the documents have been completed for the project. The project is tracked using a Gant or PERT chart. The phases of development progress one without going back, by one like a waterfall.
Not all of the system requirements are known before starting the project.
Explain the point of having two different career paths in information systems. One path is technical, and one is managerial One path is managerial, and one is analytical One path is analytical, and one is superficial One path is information, and one is systems
One path is technical, and one is managerial
What is open-source software? Open source means that the software is open to collect fees for its use. Open source software is non-licensed software that is free to copy and to use. Open source is free to use, free to distribute and is licensed using an open source license. Open source software is the most common type of software used in businesses.
Open source is free to use, free to distribute and is licensed using an open source license.
Microsoft Windows is an example of which component of information systems? Operating system software Communication software Database software Artificial intelligence software
Operating system software
What is the difference between the pilot implementation methodology and the parallel implementation methodology? Parallel implementations are more common than pilot implementations in business. Pilot methodology implements new software for just a subset of employees while the parallel implementation methodology uses both the old and the new applications at the same time. Parallel methodology implements new software for just a subset of employees while the Pilot implementation methodology uses both the old and the new applications at the same time. All of the above.
Pilot methodology implements new software for just a subset of employees while the parallel implementation methodology uses both the old and the new applications at the same time.
What are the steps in the SDLC methodology? System Analysis, Preliminary Analysis, System Design, Programming, Testing, Implementation, and Maintenance Preliminary Analysis, System Analysis, System Design, Programming, Testing, Implementation, and Maintenance Preliminary Analysis, System Analysis, System Design, Programming, Implementation, Testing, and Maintenance Preliminary Analysis, System Design, System Analysis, Programming, Testing, Implementation, and Maintenance
Preliminary Analysis, System Analysis, System Design, Programming, Testing, Implementation, and Maintenance
What statement is true about Integrated Computing? Integrating computer hardware so that it works seamlessly. Putting computers into physical things to make them "smart". Integrating separate systems within the enterprise has been a challenge for business. None of the above are correct.
Putting computers into physical things to make them "smart".
What is the difference between quantitative data and qualitative data? Quantitative data is descriptive, not numeric, like a value from a sensor or transaction. Qualitative data is numeric, like a category or a label. Quantitative data is a subset of qualitative data. Quantitative data is numeric like a value from a sensor or transaction. Qualitative data is descriptive like a category or a label. There is no difference between quantitative data and qualitative data.
Quantitative data is numeric like a value from a sensor or transaction. Qualitative data is descriptive like a category or a label.
Name two differences between RAM and a hard disk. RAM and hard disks are able to store data and software RAM is non-volatile storage and hard disks are volatile RAM is volatile storage and hard disks are non-volatile RAM is physically hard and hard disks are soft.
RAM is volatile storage and hard disks are non-volatile
Which product is an example of an enterprise resource planning system? Facebook Salesforce SAP SAS
SAP
Which hardware component below would likely not be in the common set of MIS hardware? Computers Network devices Monitors Smart watches
Smart watches
What is a computer firewall? A concrete or brick wall between condos to prevent fire from leaping across Software or hardware that filters all packets as they come into the organization using a set of rules. Hardware that encrypts and decrypts data packets as they move through an organization The insurance policy used by businesses to for computer losses due to fire or other disasters.
Software or hardware that filters all packets as they come into the organization using a set of rules.
Which is a true statement? A good way to invest in hardware and software is to follow the buying patterns of what others are doing around you. The most profitable businesses have invested in the most complex information systems. The course textbook only covers software products. Some businesses invest in the same hardware and software as their business friends even though different technology might be more appropriate for them.
Some businesses invest in the same hardware and software as their business friends even though different technology might be more appropriate for them.
What is a "killer" app? What was the killer app for the PC? Database Spreadsheet Text file Website
Spreadsheet
Which one is not an example of a business process? Fulfillment Procurement Production Strategic plan
Strategic plan
What does ISO certification signify? That a company is not mature. That a company is somewhat mature in its business processes. That a company uses technology efficiently and sustainably. That a company knows what it does, does what it says and has well defined and measurable business processes.
That a company knows what it does, does what it says and has well defined and measurable business processes.
What does it mean for a business to have a competitive advantage? it has the best MIS among its competitors. A competitive advantage is when a business has a patent for an unfair advantage. The business is making and sustaining higher profits than the average in that sector. None of the above.
The business is making and sustaining higher profits than the average in that sector.
How does Friedman define the three eras of Globalization 3.0? It was about how much horsepower, wind power, and steam power a country had and how creatively it was deployed. In this era, the dynamic force driving change was comprised of multinational companies. The convergence of the personal computer, fiber-optic Internet connections, and software has created a "flat-world platform" that allows small groups and even individuals to go global. He does not define Globalization 3.0, because there are only two eras of globalization so far.
The convergence of the personal computer, fiber-optic Internet connections, and software has created a "flat-world platform" that allows small groups and even individuals to go global.
What is responsive design? Design by adding customers to the design team Same as user-centered design The graphical interface flows effectively on multiple devices All of the above
The graphical interface flows effectively on multiple devices
What does the term globalization mean? The integration (not isolation) of goods, services, labor and cultures across the world Globalization refers to the climate crisis Globalization means the opening of markets beyond the United States None of the above
The integration (not isolation) of goods, services, labor and cultures across the world
Which came first, the Internet or the World Wide Web? The WWW came before the internet or the internet would not have been international. First came Web 2.0 then Web 1.0 then the Internet. The internet had to come first because the WWW is built on top of the internet. The WWW and the internet came at the same time because they are different names for the same thing.
The internet had to come first because the WWW is built on top of the internet.
Some of quantitative fields used by OAKS would include all but which one? The number of times a student has logged into an OAKS course. The name of the student logging into an OAKS course. The average score on Quiz 1 of a course in OAKS. The number of graded items in a course in OAKS.
The name of the student logging into an OAKS course.
