MIS 302 Final Multiple Choice

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is Moore's Law?

The number of transistors per square inch on an integrated chip doubles every 18 months.

Five Forces

Threat of New Entrants Bargaining Power of Buyers Bargaining Power of Suppliers Threat of Substitute Products Rivalry Among Competitors

Volatile vs. Non-Volatile

Volatile: cache and main memory. Mainly works with CPU for temporary store data during processing Non-volatile: Magnetic disks, solid state storage, thumb drives, optical disks, etc...

________ is a technique for harnessing the power of thousands of computers working in parallel. Select one: a. RFM analysis b. MapReduce c. Granularity d. Reposition

b. MapReduce

A primary key in a database is a ________. Select one: a. group of rows that identifies a unique table or file b. column or group of columns that identifies a unique row in a table c. group of fields or columns that represent metadata d. group of tables or files formed to identify a unique field or row

b. column or group of columns that identifies a unique row in a table

A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Select one: a. business process reengineering b. customer relationship management c. enterprise resource planning d. customer lifecycle management

b. customer relationship management

Cloud resources are ________ because many different organizations use the same physical hardware. Select one: a. elastic b. pooled c. programmatic d. portable

b. pooled

_______ in an E-R diagram refer to the least number of entities required in a relationship. Select one: a. Minimum candidate keys b. Primary keys c. Foreign keys d. Minimum cardinalities

d. Minimum cardinalities

Information systems improve process quality by ________. Select one: a. duplicating data b. entirely replacing human activity c. changing the work cultured d. controlling process flow

d. controlling process flow

Which of the following is a fundamental category of business intelligence (BI) analysis? Select one: a. automation b. encapsulation c. data hiding d. data mining

d. data mining

The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. Select one: a. accurate b. informal c. specific d. dynamic

d. dynamic

The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use. Select one: a. portable b. pooled c. programmatic d. elastic

d. elastic

Which of the following information systems eliminates data duplication and carefully manages changes to duplicated data to maintain consistency? Select one: a. departmental information systems b. workgroup information systems c. personal information systems d. enterprise information systems

d. enterprise information systems

A ________ is a set of rules that programs on two communicating devices follow. Select one: a. codec b. cloud c. packet d. protocol

d. protocol

Value Chain

the activities that add value to the company's products and services

Margin

value created by each activity less the cost of the activity

_______ is a wireless protocol designed for transmitting data over short distances, replacing cables. Select one: a. IPv6 b. PaaS c. Bluetooth d. IPv4

c. Bluetooth

________ is defined as information containing patterns, relationships, and trends of various forms of data. Select one: a. Process mining b. Business process management c. Business intelligence d. Spatial intelligence

c. Business intelligence

The ________ protocol standard is also known as Ethernet. Select one: a. Bluetooth b. IEEE 802.11 c. IEEE 802.3 d. DSL

c. IEEE 802.3

Which of the following statements is true about operational data? Select one: a. It is always better to have data with too coarse a granularity than with too fine a granularity. b. If the data granularity is too coarse, the data can be made finer by summing and combining. c. Purchased operational data often contains missing elements. d. Problematic operational data is termed rough data.

c. Purchased operational data often contains missing elements.

Which of the following statements is true about reporting applications? Select one: a. Reporting applications deliver business intelligence to users as a result of an event or particular data condition. b. Reporting applications consist of five standard components: hardware, software, data, procedures, and people. c. Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence. d. Reporting applications produce business intelligence using highly sophisticated operations.

c. Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence.

Which of the following is an example of a structured process? Select one: a. ill-defined situations b. collaboration c. customer returns d. social networking

c. customer returns

Metadata are ________. Select one: a. codes used for server-side processing b. error logs of databases c. data that describe data d. data that are encrypted

c. data that describe data

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data. Select one: a. OLAP cube b. neural network c. data warehouse d. Web server

c. data warehouse

Problematic operational data is termed as ________. Select one: a. metadata b. rough data c. dirty data d. granular data

c. dirty data

Which of the following conditions exists when data are isolated in separated information systems? Select one: a. information overload b. encapsulation c. information silo d. data segregation

c. information silo

The primary purpose of an ERP system is ________. Select one: a. customization b. duplication c. integration d. customer acquisition

c. integration

A database is used instead of a spreadsheet when ________. Select one: a. lists of data involve a single theme b. structures of data lists are simple c. lists involve data with multiple themes d. users do not want to store all data in one place

c. lists involve data with multiple themes

Which of the following is a characteristic of cloud-based hosting? Select one: a. unknown cost structure b. full control of data location c. no obsolescence d. in-depth visibility of security

c. no obsolescence

A(n) ________ is a request for data from a database. Select one: a. form b. report c. query d. application

c. query

Which of the following is an example of a supervised data mining technique? Select one: a. cluster analysis b. market-basket analysis c. regression analysis d. click streaming

c. regression analysis

What are the five components of an information system?

Hardware Software Data Procedures People

Linkage

Interactions across value activities

What is MIS?

MIS stands for "Management Information Systems"

"Brain" of computer

CPU

Which of the following is a characteristic of BigData? Select one: a. It is usually around 100 gigabytes in size. b. It is generated rapidly. c. It is processed using traditional techniques. d. It is unstructured.

b. It is generated rapidly.

Which of the following is true of MySQL? Select one: a. It is a Microsoft product. b. It is license-free for most applications. c. It is a paid and proprietary database product. d. It uses Static Query Language (SQL) to manage a database.

b. It is license-free for most applications

For communications equipment, k stands for ________. Select one: a. 1000 b. 1024 c. 100 d. 1042

a. 1000

Which of the following statements is true about unsupervised data mining? Select one: a. Analysts do not create a model or hypothesis before running the analysis. b. Neural networks are a popular unsupervised data mining application. c. Unsupervised data mining requires tools such as regression analysis. d. Data miners develop a model prior to the analysis and apply statistical techniques to data.

a. Analysts do not create a model or hypothesis before running the analysis.

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. Select one: a. database application b. database design c. data field d. data model

a. database application

The two dimensions of process quality are ________. Select one: a. efficiency and effectiveness b. performance and reliability c. conformance and durability d. perception and serviceability

a. efficiency and effectiveness

Relational databases represent relationships using ________. Select one: a. foreign keys b. file systems c. metadata d. primary keys

a. foreign keys

A data model is a ________. Select one: a. logical representation of database data b. repository of unprocessed data c. collection of isolated databases d. set of programs used to retrieve data

a. logical representation of database data

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. Select one: a. mart b. mine c. cube d. model

a. mart

The rows in a database are called ________. Select one: a. records b. tables c. files d. fields

a. records

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. Select one: a. Intellectual property protection b. Knowledge management c. Business process reengineering d. Repository management

b. Knowledge management

Enterprise application integration is a ________. Select one: a. suite of software applications that consolidates existing systems by providing layers of software that connect applications together b. strategy that uses business process management to radically enhance customer service experience from any customer base c. suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform d. suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service

a. suite of software applications that consolidates existing systems by providing layers of software that connect applications together

In market-basket terminology, ________ describes the probability that two items will be purchased together. Select one: a. support b. confidence c. lift d. dimension

a. support

The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages. Select one: a. user b. server c. database d. data link

a. user

________ is the activity of altering existing and designing new business processes to take advantage of new information systems. Select one: a. Business process modeling b. Business process reengineering c. Business process outsourcing d. Enterprise resource planning

b. Business process reengineering

_______ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Select one: a. Data entry b. Data acquisition c. Data mining d. Data encryption

b. Data acquisition

________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. Select one: a. Operational processes b. Dynamic processes c. Inherent processes d. Structured processes

b. Dynamic processes

A(n) ________ is a number that identifies a particular device. Select one: a. domain b. IP address c. hyperlink d. WSDL

b. IP address


Kaugnay na mga set ng pag-aaral

04.01 Maslow's Hierarchy of Needs

View Set

FINC 409 - Chapter 8 Practice Problems

View Set

1 JRE, JDK, JVM || The Life Cycle of a Java Program

View Set

Salesforce Platform Developer 1 questions

View Set

Module 3 - Information Security Basics - AWR-173-W

View Set

Intro to stats: Module 4, Examining Distributions Checkpoint 1

View Set

Learning and Memory Actual Questions from Test

View Set

User-Experience Research Methods

View Set

Chapter 5 workbook-Infection Prevention and Control

View Set