CIS 310 Management Information Systems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Name 2 differences between RAM and hard disk:

1. Ram can transfer data much faster than the hard disk 2. Hard disk is used for long-term data storage, whereas RAM data is lost once the computer is turned off

What are the advantages of solid-state drives over hard disk?

-Instead of spinning disks, the SSD uses flash memory, which is much faster -The use of flash memory makes them much lighter and faster than hard disks -SSDs are primarily utilized in portable computers, making them lighter and more efficient

Which of the following jobs can be an administrative support function for a company? a. Computer operator b. Help desk administrator c. Database administrator d. All of the above

All of the above

In what year were restrictions on commercial use of the Internet first lifted? When were eBay and Amazon founded?

1991, 1994

How heavy was the first commercially successful portable computer?

28lbs

Which of the following is NOT a substitute for a car? a. A bicycle b. A hybrid vehicle c. A train d. A bus

A hybrid vehicle

What is ISO 9000 certification?

A certification for best practices

What is a Local Area Network?

A network that connects a group or organization in a small geographic region

What is the definition of a process?

A series of steps undertaken to achieve a desired outcome or goal

What is the benefit of ERP? a. It helps to standardize business processes b. It has best-practices in process management built into it c. Having a centralized database helps eliminate the need for data entry and reduces errors d. All of the above

All of the above

Which describes the role of a systems analyst? a. Translate the systems requirements into an information systems design b. Work with people, teams, and departments to determine what the business requirements are c. Document business processes d. All of the above

All of the above

Which of the following is not part of the security triad? a. Confidentiality b. Integrity c. Availability d. Accessibility

Accessibility

Describe the job of a project manager. a. Lead the project, keeping it on time and within budget b Report to upper management and the project team. Communicate constantly c. Work with stakeholders to solve their IT problems. d. All of the above

All of the above

Enterprise Resource Planning (ERP) applications do what? a. Manage the data and business processes across a company b. Integrate different functional areas of a company c. Operate off a centralized database d. All of the above

All of the above

Just like a company, you can do things to ensure your recovery from a major problem (like your laptop crashing). What are some things you can do? a. Perform regular backups of your data b. Store your backup in a safe place c. Test your backup to make sure that it works d. All of the above

All of the above

Specifically, a strategic information system is one that attempts to do what? a. Deliver a product or service at low cost b. Deliver a differentiated product or service c. Enable innovation d. All of the above

All of the above

What are advantages of Business Process Management systems? a. Built in reporting b. Enforce best practices c. Enforce consistency d. All of the above

All of the above

What are some emerging roles in IT? a. Social media specialist b. Data / Business intelligence analyst c. Cloud computing specialist d. All of the above

All of the above

What are the characteristics of a relational database? a. Data is organized into tables b. Tables consist of a set of fields c. A record is the data for the set of fields in a table d. All the tables are related by one or more fields in common e. All of the above

All of the above

What is true about business processes? a. A business process is a process that is focused on achieving a goal for a business b. Processes are something that businesses go through every day in order to accomplish their mission c. Automation through technology helps make business processes more efficient and effective d. All of the above are true

All of the above are true

What is true about cloud computing? a. Information may be stored on a remote server b. Programs for running a company may be hosted on a remote server c. The infrastructure for running a company's computing assets can be rented as needed d. All of the above are true

All of the above are true

What is true about Web 3.0?

Also known as the semantic web, where users can ask questions on a browser and get intelligent information

What is a hotsite?

An alternative replica of a company's critical data center. If the primary site goes down, the alternative site is immediately brought online with no downtime experienced

What is a flattened organization?

An organization that has removed one or more layers of management, creating better communication and faster business processes

Which is NOT an example of application software? a. Candy Crush b. Microsoft Access Database c. Google Docs d. Android

Android

Which of the following is an operating system? a. Excel b. Chrome c. iTunes d. Android

Android

Why does Nicholas Carr claim IT Doesn't Matter?

Because information technology is so readily available and the software so easily copied, businesses cannot hope to implement these tools to provide any sort of competitive advantage

What items below are typical Web 2.0 activities? a. Word processing, PowerPoint, Spreadsheets b. Database programming c. Blogging, Social networking, Interactive Comments d. Online advertising

Blogging, social networking, interactive comments

This person aligns the plans and operations of the information systems with the strategic goals of the organization

CIO

According to Michael Porter, what is the definition of competitive advantage? a. Making more profit than competitors because of technological superiority b. Using technology to put other competitors out of business c. Creating and sustaining superior performance d. All of the above

Creating and sustaining superior performance

What does CRM stand for?

Customer Relationship Management

What is Big Data?

Data sets that are so large, they cannot be analyzed by conventional database tools

Which of the following is a semi-structured decision? a. Ordering inventory when a part is out of stock b. Hiring temporary workers during the holidays c. Diagnosing a medical condition d. Purchasing stock once it falls below a certain price

Diagnosing a medical condition

What is one of the criticisms of ERP systems?

ERP systems are inflexible

Which of the following is NOT an advantage of outsourcing? a. Reduce cost b. Flexible labor pool in that it is easier to hire and fire outsourced labor c. Easily negotiated contracts d. Access to specific skills that a company may not already have

Easily negotiated contracts

What is meant by "matrix organization"?

Employees have two managers, a functional manager and a project manager

What is the productivity paradox?

Even though we've added information technology to business, it has not improved productivity. Yet, we cannot think of operating a business without technology

What can prevent suspicious packets from entering a company network?

Firewall

Which of the following is not an operating system? a. Google b. Windows c. Android d. iOS

Google

What are the 5 components that make up an information system?

Hardware, software, data, people, process

Which term best describes this number: (909)999-2121? a. Data b. Information c. Knowledge d. Wisdom

Information

On the curve of technology adoption, who are the users that are first to adopt a new technology?

Innovators

What does Electronic Data Interchange (EDI) do?

Integrates the supply chain technology, so that business partners share documents and information regarding production

Which of the following is a BAD primary key? a. Social security number b. Email c. Last name d. Phone number

Last name

What is an example of an open source software

Linux

What does the term authentication mean? a. Making sure someone using the computer is who they say they are by use of passwords and other techniques b. Making sure data is accurate c. Making sure that data is kept confidential, so only the owner of the data can see it d. All of the above

Making sure someone using the computer is who they say they are by use of passwords and other techniques

Which of the following is a primary activity on the value chain? a. Human resources b. Firm infrastructure c. Procurements d. Marketing and sales

Marketing and sales

What is application software?

Microsoft Excel, Angry Birds

Microsoft Windows is an example of which component of information systems?

Operating System software

What are the two main types of software?

Operating systems and Application software

What was invented first, the PC or Internet?

PC

What does off-the-shelf mean, regarding information systems?

Purchasing a system that has already been built

Which of the following is not a network security tactic? a. Firewalls b. Intrusion Detection Systems c. Physical Security d. Remote storage of backups

Remote storage of backups

What is the definition of a process? a. Series of steps undertaken to achieve a desired outcome or goal b. continuous improvement c. Programming logic d. All of the above

Series of steps undertaken to achieve a desired outcome or goal

What was revolutionary about Web 2.0?

Social media websites such as Twitter, Facebook, and Wordpress allowed people to find and communicate with each other

Who invented the World Wide Web?

Tim Berners-Lee

Who is considered the inventor of the World Wide Web?

Tim Berners-Lee

Which of the following is a secondary activity on the value chain? a. Inbound logistics b. Technology Development c. Operations d. Outbound Logistics

Technology Development

In 2011, access to broadband was considered a basic human right by _________.

The United Nations

What were the first 4 locations hooked up to the Internet (ARPANET)?

UCLA, Stanford, MIT, University of Utah

Which of the following is NOT a way to help with password protection? a. Use a complex password b. Change your password regularly c. Use the same password for multiple web sites and computing systems d. Train people on how to create a good password

Use the same password for multiple web sites and computing systems

Antivirus software and disk defragmentation software are examples of what type of software?

Utility software

What does a document management system (DMS) control?

Versions, Approval, and Communications

What is an VPN and why is it useful?

Virtual Private Network, for employees outside of the firm to securely access the network

Which of the following is NOT an advantage of cloud computing? a. Installation and upgrades are handled by the cloud supplier b. You can get access to your cloud information from any computer connected to the Internet c. Your information is stored on someone else's computer d. Services can be leased for a limited time on an as-needed basis

Your information is stored on someone else's computer

What is a domain name?

a human-friendly name that corresponds to an IP address

What are the functions of the operating system? a. Manage the hardware resource of the computer b. Provide the user interface components c. Provide a platform for developers to write software applications d. all of the above

all of the above

What does an ERP system do? a. It offers integration of functions across organizations b. It uses a central database c. It reduces errors because the system is integrated d. all of the above

all of the above

What roles do people play in information systems? a. people run/operate information systems b. people use information systems c. people build information systems d. all of the above

all of the above

Which of the following are examples of application software? a. Word b. Google Docs c. Candy Crush d. All of the above

all of the above

Why is the personal computer now considered a commodity? a. it is part of our everyday lives b. there is very little differentiation between computers c. hundreds of manufacturers, worldwide produce parts for computers d. all of the above

all of the above

What does the term "killer app" mean?

an application that is so essential, people will buy the device to run it

What are the 3 examples of information systems hardware? a. computer, laptop, iPad b. printer, keyboard, mouse c. server, router, cables d. all of the above

all of the above

What roles do people play in information systems?

help desk, systems analyst, programmers, CIO

The CPU can also be thought of as the _______ of the computer.

brains

In general, the Internet has __________ bargaining power of customers. a. increased b. decreased c. not changed d. eliminated

increased

What is Carr's main argument about information systems?

information technology is a commodity and should be managed to reduce costs

What are examples of information systems hardware?

computers, keyboards, disk drives, iPads, flashdrives

What is cloud computing?

computing that is Internet based. It can be applications, services, and data storage

Which of the following is an example of qualitative data? a. units sold b. net profit c. the number of customer complaints d. content of customer complaints

content of customer complaints

What is metadata?

data about data

The goal of many information systems is to transform data into _______ in order to generate _______ that can be used for decision making. a. digital, information b. information, knowledge c. knowledge, questions d. reports, graphs

information, knowledge

Software that you purchase ___________. a. is owned by you b. is leased by you for a given period of time c. is not owned by you, but you have bought the license to use it d. all of these are interchangeable

is not owned by you, but you have bought the license to use it

What is Carr's main argument about information technology?

it has become a commodity. Instead of viewing technology as an investment that will make a company stand out, it should be seen as something like electricity; to be managed to reduce costs, ensure that it is always running, and be as risk-free as possible

What is role-based access control?

it is used to give users with specific characteristics (roles) different levels of access to information

What is multi-factor authentication?

it requires a user to log in (authenticate) with more than one type of identification

Which list below shows the terms ordered from smallest to largest? a. megabyte, kilobyte, terabyte, gigabyte b. gigabyte, megabyte, kilobyte, terabyte c. kilobyte, megabyte, gigabyte, terabyte d. megabyte, kilobyte, gigabyte, terabyte

kilobyte, megabyte, gigabyte, terabyte

List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz

kilohertz, megahertz, gigahertz

According to our author(s) what is the simplest way to document a process?

make a simple list of each step in the process

Which of the following is NOT a data type? a. number b. name c. text d. date

name

Microsoft Windows is an example of which component of information systems? Select the most appropriate answer. a. software b. application c. operating system d. user interface

operating system

What do rows and columns on a table (showing names of students, their major, and birthdate) represent, respectively? a. fields and records b. fields and data c. records and fields d. data and records

records and fields

Describe what the term normalization means

reduces duplication of data between tables

The Internet began in:

the 1960s

What does the term "packet" mean?

the fundamental unit of data transmitted over the Internet

What does it mean to say we are in a post-PC world?

the increased use of tablets and smartphones is putting us in a new era of computing

What is the bus of a computer?

the motherboard; "bus" refers to the electrical connection between different computer components

What is the impact of Moore's Law on the various hardware components described in this chapter?

the number of transistors on a chip will double every 2 years

What is the impact of Moore's Law on the various hardware components described in this chapter?

the number of transistors on a chip will double every 2 years; computing power will double every two years for the same price point

What are the advantages of solid-state drives over hard drives?

they use flash memory which is much faster than a traditional disk drive


Ensembles d'études connexes

Honors Biology: Chp 15 Study Guide

View Set

Chapter 2: The marketing environment and market analysis

View Set

Exam 4: Cardiovascular Dysfunction NCLEX Questions

View Set

NURS 319- Cardiogenic and Distributive Shock

View Set

Google Analytics Academy: Beginners - Assessment 3

View Set

Hair Care & Services 25% of Exam

View Set

Maternal-Neonatal Nursing (Antepartum Period, Intrapartum Period, Postpartum Period, and the Neonate)

View Set

Patho Chapter 26 Review Questions

View Set