MIS 2223 Exam 3 Quiz questions
Which of the following is another term for a JAD session? (Ch 11)
focus group
Data analysis certifications often contain the word ______ in their title. (Ch 12)
forensics
A(n) ______ database stores data in tables that consist of rows and columns. (Ch 11)
relational
In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup. (Ch 11)
rollforward
Why would a field that contains numbers have a text data type? (Ch 11)
Because the values will not be used in calculations.
Also known as BSN, is a type of PAN that wirelessly connects sensors worn by, carried by, implanted in, or attached to a human body. (Ch 10)
Body area network (BAN) or body sensor network (BSN)
A Yes/No data type also is called ______. (Ch 11)
Boolean
The drive from which your personal computer starts, which typically is an internal hard drive, such as a hard dick or SSD (Ch 9)
Boot Drive
Gracie is trying to decide between Windows or macOS for her new desktop computer. Since you have desktops that run both at home, she asks you for advice. She asks you what types of program are Safari and Edge. You tell her that these are ______. (Ch 9)
Browsers
Which of the following is NOT an advantage of the database approach? (Ch 11)
Eliminates redundant data
Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems. (Ch 9)
Embedded
Which of the following best describes the users of a VPN? (Ch 12)
Employees who work in other locations or who telecommute
Network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted (Ch 10)
Ethernet
QBE stands for query by ______. (Ch 11)
Example
Using a network, people communicate efficiently and easily via email, IM, chat rooms, blogs, wikis, online social networks, video calls, online meetings, videoconferences, VoIP, texts and more. (Ch 10)
Facilitate communications
What are the five advantages of a network? (Ch 10)
Facilitating communications, sharing hardware, sharing data and information, sharing software, transferring funds.
A DMS typically includes a CMS. (Ch 12)
False
A back end is a program that generally has a more user-friendly interface than the DBMS. (Ch 11)
False
A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases. (Ch 12)
False
A hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices. (Ch 12)
False
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. (Ch 11)
False
A relational database can store more than two dimensions of data. (Ch 11)
False
An SFA information system is used in product development. (Ch 12)
False
An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image. (Ch 11)
False
Apps designed for a specific mobile platform or device generally will work on another without significant modification. (Ch 12)
False
Because of convergence, as well as the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar. (Ch 9)
False
Continuous backup is inexpensive because the data is constantly being backed up. (Ch 11)
False
Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field. (Ch 12)
False
Eight bytes grouped together form a bit. (Ch 11)
False
Experts recommend that you run multiple antivirus programs simultaneously. (Ch 9)
False
FIP addresses concerns regarding security of information protocols. (Ch 11)
False
File processing systems require more memory and processing power than databases. (Ch 11)
False
HTML is a programming language. (Ch 11)
False
Many people initially used the term, data processing, to refer to the functions of a DMS. (Ch 12)
False
Most information gains value with time. (Ch 12)
False
Not all computer and mobile devices have an operating system. (Ch 9)
False
One advantage of ERP is complete integration of information systems across departments. (Ch 12)
False
Operating systems on embedded computers use a multitasking operating system. (Ch 9)
False
The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications. (Ch 12)
False
The kernel is an example of a nonresident instruction. (Ch 9)
False
The term, PC, sometimes is used to describe a computer that runs on a Mac operating system. (Ch 9)
False
When you use a credit card to purchase an item, you are interacting with a CMS. (Ch 12)
False
You should use a humorous name for your account profiles to ensure that you stand out to potential employers. (Ch 12)
False
A(n) ______ is the smallest unit of data a user accesses. (Ch 11)
Field
What is P2P file sharing sometimes called? (Ch 10)
File sharing network
______ is the operating system used by Amazon Kindle tablets. (Ch 9)
Fire OS
______ consists of ROM chips or flash memory chips that store permanent instructions. (Ch 9)
Firmware
Why is command-line interface considered difficult to use?
It requires exact spelling, form and punctuation
Which of the following best defines big data? (Ch 11)
Large-scale data sets that require advanced technologies
Gracie is trying to decide between Windows or macOS for her new desktop computer. Since you have desktops that run both at home, she asks you for advice. When describing the macOS interface, you tell her that she can use the ______ to view, organize, and run apps. (Ch 9)
Launchpad
(Server Operating Systems ex) Because it provides a secure, stable multiuser environment, it is often used on web servers and on supercomputers (Ch 9 Page 9-23)
Linux
A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, devices, and single-board computers. (Ch 9)
Linux
What is the operating system for Chrome OS base? (Ch 9 page 9-22)
Linux-based
A network that connects computers and devices in a limited geographical area (Ch 10)
Local area network (LAN)
Detailed analysis sometimes is called ______ design. (Ch 11)
Logical
What does LTE stand for? (Ch 10)
Long term evolution
A File ______ performs functions related to displaying and organizing files. (Ch 9)
Manager
A high-speed network that connects local area networks in a metropolitan area, such as a city or town. (Ch 10)
Metropolitan area network (MAN)
OneDrive is a cloud server from ______. (Ch 9)
Microsoft
OS on mobile devices and many consumer electronics, it also resides on firmware: (Ch 9)
Mobile operating system
Which of the following is NOT true about technology certifications? (Ch 12)
Most certification programs require academic coursework.
Allows two or more programs or apps to reside in memory at the same time: (Ch 9)
Multitasking operating system.
With a(n) ______ user interface, users interact with the software through ordinary, intuitive behavior such as touch, gesture, and voice. (Ch 9)
Natural
A collection of computers and devices connected together via communications devices and transmission media: (Ch 10)
Network
The person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. They also use the OS on the network to configure the network, install software, and administer network security. (Ch 9)
Network Administrator
The configuration of computers, devices, and media on a network is sometimes called what? (Ch 10)
Network architecture
Each computer or device on a network (Ch 10)
Node
Remains on a storage medium until they are needed, at which time they transfer into memory (RAM) (Ch 9)
Nonresident or nonresident instructions.
A(n) ______ is an item that contains data, as well as the actions that read or process the data. (Ch 11)
Object
Which data type sometimes is called BLOB? (Ch 11)
Object
How many tokens can exist per network? (Ch 10)
Only one
Android is what based mobile operating system? (Ch 9 Page 9-24).
Open source, Linux-based designed by Google.
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want to administer a network, you should look for jobs within the ______ area. (Ch 12)
Operations
Amount of data and program instructions that can be swapped at a given time: (Ch 9)
Page
Technique of swapping items between memory and storage: (Ch 9)
Paging
A program that assesses and reports information about various computer resources and devices (Ch 9 Page 9-11)
Performance Monitor
Network that connects computers and devices in an individual's workspace using wired and wireless technology (Ch 10)
Personal area network (PAN)
Which of the following best describes the role of a UX specialist? (Ch 12)
Plans and designs software and apps that consider a user's reaction to a program and its interface.
The operating system sometimes is called the ______. (Ch 9)
Platform
(TOOS) Privately owned and limited to a specific vendor or computer or device model: (Ch 9)
Proprietary software
This device accepts the transmission of data, instructions, or information (Ch 10)
Receiving Device
In situations when a boot disk is required to restart a computer or device, the book disk is referred to as ______ media. (Ch 9)
Recovery
Memory Resident: (Ch 9)
Remains in memory while the computer or mobile device is running.
Some operating systems allow users to control a network and administer security. (Ch 9)
True
The computer may run slower while is uses virtual memory (Ch 9)
True
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs. (Ch 11)
True
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. (Ch 11)
True
The trend is toward device-independent operating systems. (Ch 9)
True
To assist with sound decision making, information must have value. (Ch 12)
True
Unlike a form, you use a report writer only to retrieve data. (Ch 11)
True
Virtualization is the practice of sharing or pooling computing resources, such as servers or storage devices. (Ch 9)
True
When an organization uses the database approach, many programs and users share the data in the database. (Ch 11)
True
When you purchase a computer or mobile device, it usually has an operating system and other tools installed. (Ch 9)
True
You can use LinkedIn to follow companies to stay informed of their job opportunities. (Ch 12)
True
macOS is a UNIX-based operating system. (Ch 9)
True
(Server Operating Systems ex) Capable of handling a high volume of transactions in a multiuser environment and working with multiple processors. (Ch 9)
UNIX
A multitasking operating system developed by Bell Labs: (Ch 9)
UNIX
(TOOS) The OS may or may not run on newer versions of an OS: (CH 9)
Upward compatible
______ information has meaning to the person who receives it. (Ch 12)
Useful
Controls how you enter data and instructions and how information is displayed on the screen. (Ch 9)
User Interface (UI)
Which of the following best describes the principle of least privilege? (Ch 11)
Users' access privileges are limited to the lowest level necessary perform required tasks.
Which of the following jobs might use Google Cardboard to create storytelling tools? (Ch 12)
VR engineer
______ compares data with a set of rules or values to determine if the data meets certain criteria. (Ch 11)
Validation
______ information can be proved as correct or incorrect. (Ch 12)
Verifiable
A(n) ______ machine enables you to install a second operating system on a computer. (Ch 9)
Virtual
An environment on a computer in which you can install and run an operating system and programs. (Ch 9)
Virtual Machine (VM)
The operating system allocates a portion of a storage medium, such as a hard drive or a USB flash drive, to function as additional RAM. Computers may slow down while it uses this os. (Ch 9)
Virtual Memory
A(n) ______ engineer develops AI-based machines and programs. (Ch 12)
cognitive
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that a(n) ______ check verifies that a required field contains data. (Ch 11)
completeness
A(n) ______ database is a huge database used to analyze transactions. (Ch 11)
data warehouse
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats. (Ch 11)
visualization
An LAN that uses no physical wires (Ch 10)
wireless LAN (WLAN)
Which of the following is NOT true about DSSs? (Ch 12)
A DSS uses data only from internal sources.
Which of the following best describes the function of a TPS? (Ch 12)
A TPS captures and processes data from business activities.
Which of the following is NOT true about OOP languages? (Ch 11)
A disadvantage of OOP is that you cannot reuse or modify existing objects.
______ information is available when the decision maker needs it. (Ch 12)
Accessible
______ information is error free. (Ch 12)
Accurate
Which of the following best describes the function of an MIS? (Ch 12)
An MIS captures and processes data from business activities.
Which of the following best defines the term cross-platform application? (Ch 9)
An application that runs the same way on multiple operating systems
All of the following are examples of desktop operating systems EXCEPT ______. (Ch 9)
Android
Google Play is an example of a(n) ______. (Ch 9)
App Store
Feature that regularly provides new features or correcions to the program: (Ch 9)
Automatic Update
(TOOS) This OS can recognize and work with applications written for an earlier version of the OS (or platform): (Ch 9 Page 9-17)
Backward compatible
You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that by spooling documents to a(n) ______, the computer or mobile device can continue interpreting and executing instructions while the printer prints. (Ch 9)
Buffer
Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web? (Ch 12)
CMS
Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities. (Ch 11)
Charts
A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value. (Ch 11)
Check digit
One or more computers act as a server and the other computers on the network request services from the server.
Client/server
What are two examples of network architecture? (Ch 10)
Client/server, peer-to-peer
Other computers and mobile devices on the network that rely on the server for its resources. (Ch 10)
Clients
Some web databases are ______ databases, where users store and share media with other registered users. (Ch 11)
Collaborative
A user types commands represented by short key words or abbreviates, or press special keys on the keyboard to enter data and instructions: (Ch 9)
Command-line interface
Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents? (Ch 12)
Computer security incident responder
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job? (Ch 12)
Configure routers and firewalls
Which of the following is NOT one of the three general guidelines for system development? (Ch 11)
Create documentation The three are: 1. Group actives or tasks into phases 2. involve users 3. define standards
Which type of system's primary function is to store and manage a company's documents in a central library? (Ch 12)
DMS
Complete operating system (OS) that works on desktops, laptops, and some tablets. (Ch 9)
Desktop operating system or stand-alone operating system or client operating system
What are the three basic categories of an operating system? (Ch 9)
Desktop, server, and mobile.
Which of the following MIS reports usually lists just transactions? (Ch 12)
Detailed
(TOOS) Today's trend. OS that run on computers and mobile devices provided by a variety of manufacturers: (Ch 9)
Device-independent
A data ______ contains data about each file in the database and each field in those files. (Ch 11)
Dictionary
Describes a process in which two or more computers or devices transfer data, instructions, and information (Ch 10):
Digital communications
On computers running macOS, the ______ contains icons used to run apps, display minimized windows, and access documents. (Ch 9)
Dock
You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you replace your printer with a new one, you will have to install a(n) ______ to your computer. (Ch 9)
Driver
A small program that tells the operating system how to communicate with a specific device. (Ch 9)
Driver (short for device driver)
Many programs today use ______ on a webpage as their front end. (Ch 11)
Forms
You interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands: (Ch 9)
Graphical User Interface (GUI)
Two types of operating system user interfaces are: (Ch 9)
Graphical and command line.
Which of the following is responsible for answering technology-related questions? (Ch 12)
Help desk technician
During which phase of system development would you develop any necessary programs and apps? (Ch 11)
Implementation
Which of the following is NOT true about use of unlicensed software? (Ch 12)
In most cases, the software owner can make as many copies as desired.
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job? (Ch 12)
Inspect electronic data to recover documents and files
Which of the following best describes the role of a CRM specialist? (Ch 12)
Integrates apps and data to provide an application that manages a company's relationships with customers.
______ data is stored in separate files in different departments. (Ch 11)
Isolated
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______. (Ch 11)
It deleted logically
Initiates instruction to transmit data, instructions, or information: (Ch 10)
Sending device
The three parts of digital communication (Ch 10)
Sending device, transmission media, and receiving device.
Controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data and information (Ch 10)
Server
A multiuser operating system that organizes and coordinates how multiple users access and share resources on a network. (Ch 9)
Server operating system
Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software. (Ch 9)
Service Pack
Many software makers provide free downloadable updates, to users who have registered, and/ or activated their software: (Ch 9)
Service Pack
Any authorized user can access data and information stored on a network (Ch 10)
Share data and information
Each computer or device on a network can be provided access to hardware on the network (Ch 10)
Share hardware
Users connected to a network can access software on the network. (Ch 10)
Share software
Which of the following is NOT an activity in the implementation phase? (Ch 11)
Solicit vendor proposals
Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs. (Ch 12)
Specialist
The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer. (Ch 9)
Spooling
What can a desktop operating system sometimes be called? (Ch 9)
Stand- alone operating system or client operating system.
A mobile ______ integrates and expands the company's initiatives for mobile users. (Ch 12)
Strategist
Which of the following MIS reports usually includes tables and graphs? (Ch 12)
Summary
The area of the hard drive used for virtual memory is called a(n) ______ file. (Ch 9)
Swap
Are of the hard drive used for virual memory. it exchanges data, information and instructions between memory and storage: (Ch 9)
Swap File
Which of the following is responsible for designing and developing information systems? (Ch 12)
Systems analyst
Network protocol that defines how messages (data) are routed from one end of a network to another. (Ch 10)
TCP/IP
In some database programs, a data file is referred to as a(n) ______. ( Ch 11)
Table
In some database programs, a data file is referred to as a(n) ______. (Ch 11)
Table
Which of the following serves as an interface between programmers/developers and management? (Ch 12)
Technical project manager
The care of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources such as; devices, programs, apps, data, and information. It is also a memory resident. (Ch 9 page 9-4)
The Kernel
What happens if your computer or mobile device uses up its available RAM? (Ch 9)
The operating system may use virtual memory.
Which of the following is NOT true about network security? (Ch 9)
The operating system on a network does not record unsuccessful sign-in attempts.
What is meant by the term Plug and Play? (Ch 9)
The operating system that automatically configures new devices as you install or connect them
Which of the following best describes paging? (Ch 9)
The technique of swapping items between memory and storage.
When an operating system spends much of its time paging, instead of executing application software: (Ch 9)
Thrashing
When an operating system spends much of its time paging, it is said to be ______. (Ch 9)
Thrashing
______ information is useful only within a specific time period. (Ch 12)
Timely
Which of the following best describes the function of a primary key? (Ch 11)
To uniquely identify each record in a file
Special series of bits that function like a ticket. The device that has this can transmit data over the network (Ch 10)
Token
Standard specifies that computers and devices on the network share or pass a special signal in a unidirectional manner and in a present order. (Ch 10)
Token Ring
Also called Electronic funds transfer (EFT), this allows users connected to a network to exchange money from one account to another vis transmission media (Ch 10 page 10-4)
Transfer funds
Also called communication channel, on which the data, instructions, or information travel (Ch 10)
Transmission Media
A composite key consists on multiple fields. (Ch 11)
True
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format. (Ch 11)
True
A queue is the lineup of documents waiting to be printed. (Ch 9)
True
Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app. (Ch 11)
True
Bloggers use CMSs to post to their blogs and provide categories to posts. (Ch 12)
True
CISSP is an example of a security certification. (Ch 12)
True
Census records, stock values, and corporate sales data is structured. (Ch 11)
True
Client operating systems operate with or without a network (Ch 9 Page 9-17)
True
Database software is another term for a DBMS.
True
Database software is another term for a DBMS. (Ch 11)
True
Diagnostic software included with a computer or device assists technicians in identifying problems. (Ch 12)
True
Dice and Monster are examples of career planning websites and apps. (Ch 12)
True
Expert systems are a component of artificial intelligence. (Ch 12)
True
Geofencing enables your phone to send or receive notifications when you enter or exit a geographic location. (Ch 9)
True
Human resources is an example of a functional unit. (Ch 12)
True
IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems. (Ch 12)
True
If thrashing occurs, try to exit the program. If that does not work, try a warm boot and then a cold boot. (Ch 9)
True
In a typical file processing system, each department or area within an organization has its own set of files. (Ch 11)
True
Inference rules are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system. (Ch 12)
True
Information systems support daily, short-term, and long-range information requirements of users in a company. (Ch 12)
True
Mobile web apps are actually websites that provide a user experience similar to native apps. (Ch 12)
True
Most TPSs use OLTP because users need information immediately. (Ch 12)
True
Which of the following best describes jailbreaking? (Ch 12)
When a user makes unauthorized modifications to a device's operating system.
Network that covers a large geographic area using wired and wireless transmission (Ch 10)
Wide area network (WAN)
(Server Operating Systems- ex) Developed by Microsoft, this server enables organizations to manage applications and websites on-site and or on the cloud: (Ch 9 Page 9-23)
Windows Server
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together. (Ch 12)
information
A(n) ______ translates and executes one instruction at a time and converts it to machine language. (Ch 11)
interpreter
(Server Operating Systems ex) Developed by Apple, this server enables organizations to collaborate, share files, host websites, and mail servers. (Ch 9)
macOS Server
File ______ refers to the procedures that keep data current. (Ch 11)
maintenance
CAM and MRP are examples of information systems used in ______. (Ch 12)
manufacturing
Cisco certifications that test knowledge of installing, configuring, operating, and administering ______. (Ch 12)
networks