IS 220 Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

All of these answers

Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______ 1. Emails 2. Instant Messages 3. Website Views 4. All of these answers

Ergonomics

Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind

System Operators

_____ are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output.

Supercomputers

_____ are the most powerful computers with the fastest processing speed and highest performance

Optical mark recognition (OMR) systems

_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections

Workstations

_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor

Thin Client

A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities

Flexible

A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.

Formation of blood clots

A job that requires sitting at a desk and using a computer for many hours a day can lead to _______

Nonvolatile

A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____

Input/Output

A(n) _____ device provides data and instructions to the computer and receives results from it

Virtual Team

A(n) _____ is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology.

System Analyst

A(n) _____ is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users' needs, monitoring and testing the system in operation, and troubleshooting problems after implementation.

Redress

According to the Better Business Bureau, a business's privacy notice should include some method of _____, which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way

Past Performance

All of the following are positive driving forces that influence chance according to Lewin's Theory of Force Field Analysis, EXCEPT: 1. Past Performance 2. Expectations 3. Beliefs 4. Cultural Norms

Health Insurance Portability and Accountability Act

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________

Workgroup

An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.

Multitasking

An operating system with _____ capabilities allows a user to run more than one program concurrently

Filtering Software

Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______

Number of electronic pulses created

CPU clock speed is the _______________ at a predetermined rate

Byte

Eight bits together form a(n) _____

All of these answers

Flexibility is a major component of ergonomic design, mainly because: _______ 1. People come in a wide range of shapes and sizes 2. People have their own preferences 3. People need to be able to position equipment in different ways for best results 4. All of these answers

Weighing options

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

All of these

Important functions of the chief information officer include: 1. Employing an IS department's equipment and staff to help the organization reach its goals 2. Ensuring the organization complies with laws and regulations 3. Monitoring the financial considerations of the IS department, such as return on investment 4. All of these

Finance and Accounting

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: 1. Inbound Logistics 2. Customer Service 3. Marketing and Sales 4. Finance and Accounting

Personal cell phone and internet surfing

In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?​

Physical Flows

In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials.

Cyberloafing

Kay should have been inputting data into her employer's database, but instead she was ____, meaning she was surfing the Internet, online shopping, and playing games

Single- User License

Lara recently purchased the Microsoft Office Suite for her own use on her laptop. She has not really purchased the software but rather a ____.​

A repetitive strain injury

Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______

Innovators

Of the five categories of innovation adopters, _______ are always the first to try new products and ideas.​

3D Printer

One common use of a _______ is in engineering design, when designers need to make a prototype, or model, of the object they're designing

All of these answers

RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________ ​1. In children to enable parents to find them if lost 2. ​In criminals to allow law enforcement agents to find them if needed ​3. In all humans to give medical professionals instant access to medical records and conditions ​4. All of these answers

Encrypted

Sending an email message is like having an open conversation in public—many people can listen to your messages, especially if they are not _____

Early Majority

Suppose you work at a business unit that has group of people who would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the _________.

True

T/F- A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.

True

T/F- Data represents real-world things including raw facts such as image and audio data.

True

T/F- Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.

False

T/F- If an activity is defined as legal then it is ethical

False

T/F- Information is simply a collection of raw facts such as an employee number or the total hours worked in a week.

False

T/F- It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.

True

T/F- One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit.

True

T/F- Opportunities in information systems are available to people from different parts of the world.

True

T/F- Perceived usefulness and ease of use of a system influence an individual's attitude toward the system.

False

T/F- RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted.

True

T/F- Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.

False

T/F- The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.​​

True

T/F- The need for additional data storage capacity is one of the factors driving the growth in data centers.

True

T/F- U.S. federal law permits employers to monitor email sent and received by employees

True

T/F-Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory.

Kernel

The _____ is the heart of the operating system and controls its most critical processes

Scalability

The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period is known as

Main Memory

The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.

Continuous Improvement

The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services.

Disruptive Innovations

The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as

Knowledge

The process of defining relationships among data to create useful information requires ______.

Secure

To keep information beyond reach of unauthorized users is to keep the information _____.

All of these answers

To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________ 1. The assignment of clear responsibility for data accuracy within each information system 2. The use of data editing to ensure data accuracy and completeness 3. The implementation of source data automation 4. All of these answers

Mishandling computer outputs

Which of the following is a computer-related mistake? 1. Operating unintegrated information systems. 2. Acquiring redundant systems. 3. Exhausting information system resources. 4. Mishandling computer outputs.

All of these answers

Which of the following is a smart way to reduce the impact of software bugs on your own computing? ​1. Register the software programs you buy so that you receive bug alerts, fixes, and patches. ​2. Install the latest software updates 3. Check the read-me files or online support Web site for patches and other solutions. ​4. All of these answers

Users should implement proper procedures to ensure correct input data

Which of the following is a useful policy to minimize waste and mistakes? 1. System report titles should be as brief as possible and should simply indicate the report number. 2. Tight control should be avoided over critical tables 3. Changes to HTML and URLs should be documented and authorized by end users 4. Users should implement proper procedures to ensure correct input data

Diffusion of Innovation Theory

Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization? 1. Contingency Theory 2. Public Choice Theory 3. Two Factor Theory 4. Diffusion of Innovation Theory

Gathering Information

While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?

Supply Chain Management

_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. ​

Libel

_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation

Green Computing

_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.

Syntax

_____ is a set of rules associated with a programming language.

Leavitt's Diamond

_____ is a theory that proposes that every organizational system is made up of four main components—people, tasks, structure, and technology—with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements.

Carpal tunnel syndrome (CTS)

_____ is an inflammation of the nerve that connects the forearm to the palm of the wrist

Knowledge

_____ is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision.

Ergonomics

_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them

Grid Computing

_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem

Ethical

_____ issues deal with what is generally considered right or wrong

Code of ethics

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior

Innovators

​According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.

Allowing a user to do word processing

​All of the following are examples of activities performed by an operating system EXCEPT________ 1. Allowing a user to manage files 2. Allowing a user to do word processing 3. Allowing a user to manage system memory 4. Allowing a user to control common computer hardware functions

The information systems security analyst

​In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________

Presentation Graphics

​Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?

Systems

​Which of the following is NOT one of the four main components in Leavitt's Diamond? 1. Tasks 2. People 3. Technology 4. Systems

Apply Data

​Which of the following is NOT one of the functions of a computer-based information system? 1. Collect Data 2. Apply Data 3. Store Data 4. Process Data


Ensembles d'études connexes

Science Quest seasons/longitude and latitude

View Set

6.6.10 Network Pro Practice Questions

View Set

Accounting Intermediate Krylova Ch3-4

View Set

EYEWITNESS IDENTIFICATION AND TESTIMONY

View Set