MIS 3302 Mod 1-6 Study Questions
Identify an advantage of a mouse over a trackball.
A mouse is more precise in positioning the pointer than a trackball.
When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.
AND operation
The principle of ___ in object-oriented programming is used to handle complexity by hiding unnecessary details from the user.
Abstraction
The data component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management
Administration
is an example of a secondary memory device.
An optical disc
Which decision is supported by a manufacturing information system (MFIS)?
Analysis of price changes and discounts
In a management information system, structuring the data component to define what type of data is collected and in what form is usually easy of an organization has
Defined its strategic goals, objectives, and critical factors
Which decision is supported by a financial information system (FIS)?
Determining portfolio structures
strategy was identified by Michael Porter, a professor at Harvard Business School, for successfully competing in the marketplace
Differentiation
A ___ is a peripheral device for recording, storing, and retrieving information.
Disk Drive
contain large-capacity hard drives and enable users to store files and applications for later retrieval.
Disk servers
bits equal one byte.
Eight
Which of the following is recommended in the context of a comprehensive security plan?
Employees should be trained in security measures
In object-oriented databases, grouping objects along with their attributes and methods into a class is called
Encapsulation
The threat of new entrants into the marketplace is high when duplicating a company's product or service is difficult
FALSE
Structured query language (SQL) is an example of
Fourth-generation language
Minimizing the electricity consumption of computers and other digital devices is considered _________.
Green Use
In a ___ model the relationships among records forma treelike structure.
Hierarchical
In a ___ nodes with the same parent are called twins or siblings
Hierarchical model
Knowledge workers are not required to know
How to design transactional-processing systems
Which of the following is considered a unique feature of Tableau?
In-depth insights and "what-if" anaylsis
What can help offset the digital divide?
Increasing the number of computers in public places
Users need to be able to make use of ___ such as rumors, unconfirmed reports, and stories, when solving problems.
Informal information
___ used in object-oriented databases, refers to new objects being created faster and more easily by entering new data in attributes.
Inheritance
Third-generation computers operated on
Integrated circuits
___ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.
Integrity rules
A ___ enables communication between a video card and memory
Internal bus
Which is true of the supervisor program of an operating system (OS)?
It controls compliers in the OS
In the context of using information technologies for a competitive advantage, which statement is true of bottom-line strategy?
It focuses on improving efficiency by reducing overall costs
Which statement is true of bug data?
It is the result of exponential growth of data in both public and private organizations.
In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?
Job upgrading
What is a potential drawback of telecommuting?
Lack of necessary supplies or equipment
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.
Legal byt unethical
___ which are generated by web server software, record a user's actions on a web site.
Log files
The ___ view of a database involves how information appears to users and how it can be organized and retrieved
Logical
Which of the following is considered a basic task in the context of computer operations?
Logical operations
The data ___ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
MANIPULATION
A ___ made of Mylar is used for random-access processing of data in a computer.
Magnetic disc
A ___ is an input device for computers.
Mouse
In object-oriented programming, a class
NOT is an item that contains data and the procedures to rd adn manipul it blueprint for creating objects
In a ___ each record can have multiple parent and child records.
Network
UNIX is a type of
Operating system
A ___ is an input device used to grade multiple-choice and true/false tests.
Optical mark recognition system
A ___ is an intellectual property that protects new processes
Patent
A ___ provides reports and statistics on employee demographics.
Personnel information system
In a relational database every record must be uniquely identified by a ___ key.
Primary
Risks associated with big data technology include which of the following?
Privacy breaches, loss of anonymity, and discrimination
A ___ is a step-by-step direction for performing a specified task, which is written in a language the computer can understand.
Program
The final task in designing a management information system (MIS) is
Providing information in a useful format for decision-making purposes
The Clipboard's contents are typically stored in
Random access memory
The method for accessing files is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.
Sequential Access File Structure Method
A data mart is usually ___ a data warehouse.
Smaller than
Writing data to a hard drive is an example of a ___ operation.
Storage
means saving data in computer memory
Storage
In an automated payroll system, there is little need for managerial judgement in the task of printing and sending checks.
TRUE
Which of the following are two popular data visualization platforms?
Tableau and Power BI
___ are the top 3 countries for generating spam.
The United States, China, Russia
Which is true of memory devices?
The contents of programmable read-only memory cannot be reprogrammed.
Which file structure is similar to a book index that lists page numbers where certain topics can be found?
The indexed sequential access method
Which of the following is not an advantage that data marts have over data warehouses?
They are larger and often more complex
Which statement is true of transaction-processing systems?
They focus on data collection and processing
Which is true of virtual organizations?
They let independent suppliers share skills and have access to each other's markets via information technologies.
In the context of information privacy, which is true of cookies?
They provide info about users' location
Which statement is true of gallium arsenide chips?
They run at higher speeds than silicon chips
An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use.
True
Some organizations add services, such as personalized recommendations, to reduce the threat of customers choosing substitute products or services.
True
refers to computing devices everywhere with different sizes and power accessed through multiple formats such as voice, touch, adn gesture.
Ubiquitous computing
The principle of ___ is the idea that several organizations working together can do what one organization cannot.
Virtual Organization
Which is an example of a video-sharing site?
YouTube
To guard against possible legal ramifications and the consequences of using the web and networks, an organization usually est
acceptable use policy
Database management systems
are used to create, organize, and manage databases.
In the context of computer operations, division is an ___
arithmetic operation
In designing a management information system (MIS) the first task is to
clearly define the system's objectives.
___ make it possible for web sites to customize pages for users
cookies
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as ___ are being developed.
e-wallets
Job deskilling occurs when
experienced labor is eliminated by high technology.
In the context of green computing, properly recycling an unwanted digital device is considered
green disposal
In a ___ records are organized and processed in numerical order.
sequential access file structure
In the context if Web and network privacy, an acceptable use policy is a
set of rules specifying the legal and ethical use of a system and the consequences of noncompliance
In the context of security, ___ is an attack that takes advantage of the human element of security systems.
social engineering
Data warehouses are sometimes called hypercubes because they
store multidimensional data
The data component of an information system is
the input to the information system.
systems traditionally have been applied to structured tasks such as inventory control.
transaction-processing
When a user accidentally enters incorrect website address she may be directed to an alternative website this is an example of
typosquatting
In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains
why the buyer buys a product or service
In the context of intellectual property, which is characterized as copyrighted material?
Artistic works
Codes written for one type of computer using ___ do not work on another type of computer.
Assembly language
Information literacy involves understanding the role of information in generating
Business intelligence
Identify a program used by parents to prevent their children's access to certain web sites.
CYBERSitter
Which is a nonbiometric security measure?
Callback modems
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon
Cannot emit light and has speed limitations
The ___ is the heart of a computer.
Central Processing Unit
which is used for online storage and backup, involved multiple virtual servers that are usually hosted by third parties.
Cloud Storage
To minimize the invasion of privacy, organizations should
Collect only the data that is necessary for the stated purpose.
___ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone elses account.
Computer fraud
is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
Computer literacy
In the context of a database marketing campaign, ___ tells a business how much it should spend to maintain a relationship.
Customer lifetime value (CLTV)
The ___ component of an information system consists of raw facts and by itself is difficult to use for making decisions.
Data
A ___ is software for creating, storing, maintaining, adn accessing database files.
Database management system
A ___ is software for creating, storing, maintaining, and accessing database files.
Database management system