MIS 3302 Mod 1-6 Study Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Identify an advantage of a mouse over a trackball.

A mouse is more precise in positioning the pointer than a trackball.

When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.

AND operation

The principle of ___ in object-oriented programming is used to handle complexity by hiding unnecessary details from the user.

Abstraction

The data component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management

Administration

is an example of a secondary memory device.

An optical disc

Which decision is supported by a manufacturing information system (MFIS)?

Analysis of price changes and discounts

In a management information system, structuring the data component to define what type of data is collected and in what form is usually easy of an organization has

Defined its strategic goals, objectives, and critical factors

Which decision is supported by a financial information system (FIS)?

Determining portfolio structures

strategy was identified by Michael Porter, a professor at Harvard Business School, for successfully competing in the marketplace

Differentiation

A ___ is a peripheral device for recording, storing, and retrieving information.

Disk Drive

contain large-capacity hard drives and enable users to store files and applications for later retrieval.

Disk servers

bits equal one byte.

Eight

Which of the following is recommended in the context of a comprehensive security plan?

Employees should be trained in security measures

In object-oriented databases, grouping objects along with their attributes and methods into a class is called

Encapsulation

The threat of new entrants into the marketplace is high when duplicating a company's product or service is difficult

FALSE

Structured query language (SQL) is an example of

Fourth-generation language

Minimizing the electricity consumption of computers and other digital devices is considered _________.

Green Use

In a ___ model the relationships among records forma treelike structure.

Hierarchical

In a ___ nodes with the same parent are called twins or siblings

Hierarchical model

Knowledge workers are not required to know

How to design transactional-processing systems

Which of the following is considered a unique feature of Tableau?

In-depth insights and "what-if" anaylsis

What can help offset the digital divide?

Increasing the number of computers in public places

Users need to be able to make use of ___ such as rumors, unconfirmed reports, and stories, when solving problems.

Informal information

___ used in object-oriented databases, refers to new objects being created faster and more easily by entering new data in attributes.

Inheritance

Third-generation computers operated on

Integrated circuits

___ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.

Integrity rules

A ___ enables communication between a video card and memory

Internal bus

Which is true of the supervisor program of an operating system (OS)?

It controls compliers in the OS

In the context of using information technologies for a competitive advantage, which statement is true of bottom-line strategy?

It focuses on improving efficiency by reducing overall costs

Which statement is true of bug data?

It is the result of exponential growth of data in both public and private organizations.

In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?

Job upgrading

What is a potential drawback of telecommuting?

Lack of necessary supplies or equipment

Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.

Legal byt unethical

___ which are generated by web server software, record a user's actions on a web site.

Log files

The ___ view of a database involves how information appears to users and how it can be organized and retrieved

Logical

Which of the following is considered a basic task in the context of computer operations?

Logical operations

The data ___ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.

MANIPULATION

A ___ made of Mylar is used for random-access processing of data in a computer.

Magnetic disc

A ___ is an input device for computers.

Mouse

In object-oriented programming, a class

NOT is an item that contains data and the procedures to rd adn manipul it blueprint for creating objects

In a ___ each record can have multiple parent and child records.

Network

UNIX is a type of

Operating system

A ___ is an input device used to grade multiple-choice and true/false tests.

Optical mark recognition system

A ___ is an intellectual property that protects new processes

Patent

A ___ provides reports and statistics on employee demographics.

Personnel information system

In a relational database every record must be uniquely identified by a ___ key.

Primary

Risks associated with big data technology include which of the following?

Privacy breaches, loss of anonymity, and discrimination

A ___ is a step-by-step direction for performing a specified task, which is written in a language the computer can understand.

Program

The final task in designing a management information system (MIS) is

Providing information in a useful format for decision-making purposes

The Clipboard's contents are typically stored in

Random access memory

The method for accessing files is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.

Sequential Access File Structure Method

A data mart is usually ___ a data warehouse.

Smaller than

Writing data to a hard drive is an example of a ___ operation.

Storage

means saving data in computer memory

Storage

In an automated payroll system, there is little need for managerial judgement in the task of printing and sending checks.

TRUE

Which of the following are two popular data visualization platforms?

Tableau and Power BI

___ are the top 3 countries for generating spam.

The United States, China, Russia

Which is true of memory devices?

The contents of programmable read-only memory cannot be reprogrammed.

Which file structure is similar to a book index that lists page numbers where certain topics can be found?

The indexed sequential access method

Which of the following is not an advantage that data marts have over data warehouses?

They are larger and often more complex

Which statement is true of transaction-processing systems?

They focus on data collection and processing

Which is true of virtual organizations?

They let independent suppliers share skills and have access to each other's markets via information technologies.

In the context of information privacy, which is true of cookies?

They provide info about users' location

Which statement is true of gallium arsenide chips?

They run at higher speeds than silicon chips

An information system should collect data from both external and internal sources, although organizational objectives and the type of application also determine what sources to use.

True

Some organizations add services, such as personalized recommendations, to reduce the threat of customers choosing substitute products or services.

True

refers to computing devices everywhere with different sizes and power accessed through multiple formats such as voice, touch, adn gesture.

Ubiquitous computing

The principle of ___ is the idea that several organizations working together can do what one organization cannot.

Virtual Organization

Which is an example of a video-sharing site?

YouTube

To guard against possible legal ramifications and the consequences of using the web and networks, an organization usually est

acceptable use policy

Database management systems

are used to create, organize, and manage databases.

In the context of computer operations, division is an ___

arithmetic operation

In designing a management information system (MIS) the first task is to

clearly define the system's objectives.

___ make it possible for web sites to customize pages for users

cookies

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as ___ are being developed.

e-wallets

Job deskilling occurs when

experienced labor is eliminated by high technology.

In the context of green computing, properly recycling an unwanted digital device is considered

green disposal

In a ___ records are organized and processed in numerical order.

sequential access file structure

In the context if Web and network privacy, an acceptable use policy is a

set of rules specifying the legal and ethical use of a system and the consequences of noncompliance

In the context of security, ___ is an attack that takes advantage of the human element of security systems.

social engineering

Data warehouses are sometimes called hypercubes because they

store multidimensional data

The data component of an information system is

the input to the information system.

systems traditionally have been applied to structured tasks such as inventory control.

transaction-processing

When a user accidentally enters incorrect website address she may be directed to an alternative website this is an example of

typosquatting

In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains

why the buyer buys a product or service

In the context of intellectual property, which is characterized as copyrighted material?

Artistic works

Codes written for one type of computer using ___ do not work on another type of computer.

Assembly language

Information literacy involves understanding the role of information in generating

Business intelligence

Identify a program used by parents to prevent their children's access to certain web sites.

CYBERSitter

Which is a nonbiometric security measure?

Callback modems

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon

Cannot emit light and has speed limitations

The ___ is the heart of a computer.

Central Processing Unit

which is used for online storage and backup, involved multiple virtual servers that are usually hosted by third parties.

Cloud Storage

To minimize the invasion of privacy, organizations should

Collect only the data that is necessary for the stated purpose.

___ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone elses account.

Computer fraud

is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.

Computer literacy

In the context of a database marketing campaign, ___ tells a business how much it should spend to maintain a relationship.

Customer lifetime value (CLTV)

The ___ component of an information system consists of raw facts and by itself is difficult to use for making decisions.

Data

A ___ is software for creating, storing, maintaining, adn accessing database files.

Database management system

A ___ is software for creating, storing, maintaining, and accessing database files.

Database management system


Ensembles d'études connexes

license patient care technician quizes

View Set

HA Chapter 1-3: Analysis phase of nursing process; Subjective vs. Objective Data

View Set

Module 6 Quiz: Intellectual Property

View Set

2020 NJROTC National Academic Exam Practice

View Set